Description
A path traversal vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java that allows attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.
Remediation
References
http://www.securityfocus.com/bid/106532
https://jenkins.io/security/advisory/2018-10-10/#SECURITY-1074
Related Vulnerabilities
CVE-2021-20087 Vulnerability in npm package jquery-deparam
CVE-2018-11012 Vulnerability in maven package cc.ryanc:halo
CVE-2020-14062 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2018-8013 Vulnerability in maven package org.eclipse.birt.runtime:org.apache.batik.dom
CVE-2022-43426 Vulnerability in maven package io.jenkins.plugins:s3explorer