Description
The file browser in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Overall/Read permission (Windows controller) or Job/Workspace permission (Windows agents) to obtain the contents of arbitrary files.
Remediation
References
Related Vulnerabilities
WordPress Plugin Appointment Hour Booking-WordPress Booking Cross-Site Scripting (1.1.44)
SharePoint CVE-2020-0975 Vulnerability (CVE-2020-0975)
WordPress Plugin Correos Woocommerce Arbitrary File Download (1.3.0.0)
SharePoint Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-3895)