Description
A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.
Remediation
References
https://jenkins.io/security/advisory/2018-10-10/#SECURITY-867
Related Vulnerabilities
CVE-2018-1000403 Vulnerability in maven package org.jenkins-ci.plugins:codedeploy
CVE-2022-32549 Vulnerability in maven package org.apache.sling:org.apache.sling.api
CVE-2018-8718 Vulnerability in maven package org.jenkins-ci.plugins:mailer
CVE-2018-1000010 Vulnerability in maven package org.jvnet.hudson.plugins:dry
CVE-2015-0250 Vulnerability in maven package batik:batik-transcoder