Description
An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenkins home directory is on a case-insensitive file system.
Remediation
References
https://jenkins.io/security/advisory/2018-02-14/#SECURITY-717
http://www.securityfocus.com/bid/103101
https://www.oracle.com/security-alerts/cpuapr2022.html
Related Vulnerabilities
CVE-2023-5654 Vulnerability in npm package react-devtools-core
CVE-2016-0779 Vulnerability in maven package org.apache.tomee:arquillian-tomee-embedded
CVE-2020-13953 Vulnerability in maven package org.apache.tapestry:tapestry-core
CVE-2019-1003041 Vulnerability in maven package org.jenkins-ci.plugins:groovy
CVE-2023-28709 Vulnerability in maven package org.apache.tomcat:tomcat-catalina