CVE-2020-2278:
Arbitrary file write vulnerability in Jenkins Storable Configs Plugin
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.76107%
CWE
Published
5/24/2022
Updated
10/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jvnet.hudson.plugins:storable-configs-plugin | maven | <= 1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key failures: 1) accepting user-controlled filenames
without path traversal checks, and 2) writing files to arbitrary locations by not properly constraining the target directory. Jenkins plugin patterns suggest these operations would be handled in action classes (like Action.java
) and file utility classes. The first function
likely handles the HTTP
request to save configs
, while the second processes the filename
input. Both would lack validation
logic to prevent escaping the intended storage directory, matching the CWE-22
description and advisory details about unrestricted filenames
leading to arbitrary XML
file overwrites.