-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from Jenkins' filename validation logic allowing trailing dots in entity names. The commit diff shows the vulnerability was patched by adding a trailing dot check in Jenkins.checkGoodName(). In vulnerable versions, this function did not include the 'endsWith(".")' validation, making it the root cause. The function is directly responsible for validating entity names and its lack of trailing dot handling created the path equivalence vulnerability on Windows systems.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.main:jenkins-core | maven | >= 2.304, <= 2.314 | 2.315 |
| org.jenkins-ci.main:jenkins-core | maven | <= 2.303.1 | 2.303.2 |
Ongoing coverage of React2Shell