RULE(RULE ID:321853)

Rule General Information
Release Date: 2019-06-14
Rule Name: Jenkins CI Server LocaleDrivenResourceSelector Arbitrary File Read Vulnerability (CVE-2018-1999002)
Severity:
CVE ID:
Rule Protection Details
Description: A arbitrary file read vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers to send crafted HTTP requests returning the contents of any file on the Jenkins master file system that the Jenkins master has access to.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: ExploitDB:46453
https://jenkins.io/security/advisory/2018-07-18/#SECURITY-914
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://jenkins.io/security/advisory/2018-07-18/#SECURITY-914