CVE-2022-28148:
Path traversal vulnerability on Windows in Jenkins Continuous Integration with Toad Edge Plugin
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.49341%
CWE
Published
3/30/2022
Updated
2/2/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:ci-with-toad-edge | maven | < 2.4 | 2.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the plugin's use of a patched fork of Jenkins' DirectoryBrowserSupport
class that lacked the SECURITY-2481
fix. This fix in core Jenkins addressed path traversal via absolute paths on Windows. The plugin's fork would have contained modified versions of key path-handling methods like serveFile()
(for file serving) and resolvePath()
(for path validation). These functions failed to account for Windows absolute path syntax (e.g., 'C:'), allowing attackers to escape restricted directories. The high confidence comes from the explicit advisory mention of the missing SECURITY-2481
fix and the Windows-specific path interpretation flaw.