CVE-2020-2275: Arbitrary file read vulnerability in Copy data to workspace Jenkins Plugin
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.8035%
CWE
Published
5/24/2022
Updated
1/28/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jvnet.hudson.plugins:copy-data-to-workspace-plugin | maven | <= 1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the plugin's failure to restrict source directories during file copy operations. The primary function handling this logic would be the method responsible for executing the copy operation (commonly named 'perform' in Jenkins builders). Since the plugin allows attackers to specify arbitrary paths without validation, this function would directly process the user-controlled input and copy files from unrestricted locations. The CWE-22 classification and the advisory's description of unrestricted directory access strongly indicate that the file-copying function lacks proper path sanitization.