CVE-2022-45388: Jenkins Config Rotator Plugin vulnerable to path traversal
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.44295%
CWE
Published
11/16/2022
Updated
11/5/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.main:config-rotator | maven | <= 2.0.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from an unauthenticated HTTP endpoint that accepts a file name parameter without restricting path traversal characters. The plugin's failure to validate/sanitize this parameter allows attackers to escape the intended directory and read .xml files. While the exact function name isn't provided in advisories, Jenkins plugins typically implement HTTP endpoints via servlet classes with methods like doGet/doPost. The confidence is high because the advisory explicitly states the lack of parameter validation in an HTTP endpoint as the root cause.