Jenkins 任意文件读取漏洞(CVE-2018-1999002) CVE-2018-1999002 CNNVD-201807-1740

5.0 AV AC AU C I A
发布: 2018-07-23
修订: 2019-03-05

### SECURITY-914 / CVE-2018-1999002 An arbitrary file read vulnerability in the Stapler web framework used by Jenkins allowed unauthenticated users to send crafted HTTP requests returning the contents of any file on the Jenkins master file system that the Jenkins master process has access to. Input validation in Stapler has been improved to prevent this. ### 漏洞影响版本: * Jenkins weekly up to and including 2.132 * Jenkins LTS up to and including 2.121.1 ### 漏洞复现 测试环境: win平台 通过查找commit记录可知需要将其检出至 29ca81dd59c255ad633f1bd86cf1be40a5f02c64之前 ``` > git clone https://github.com/jenkinsci/jenkins.git > git checkout 40250f08aca7f3f8816f21870ee23463a52ef2f2 ``` 检查core/pom.xml的第41行,确保版本为1.250 ``` <staplerFork>true</staplerFork> <stapler.version>1.250</stapler.version> ``` 然后命令行下编译war包 ``` mvn clean install -pl war -am -DskipTests ``` 在jenkins\war\target目录下获得编译好的jenkins.war,同目录下启动: ``` java -jar jenkins.war ``` 在管理员登陆(有cookie)的情况下 ![](https://images.seebug.org/1532571467608)...

0%
当前有1条漏洞利用/PoC
当前有1条受影响产品信息