Description
A path traversal vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java that allows attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.
Remediation
References
http://www.securityfocus.com/bid/106532
https://jenkins.io/security/advisory/2018-10-10/#SECURITY-1074
Related Vulnerabilities
CVE-2020-12265 Vulnerability in maven package org.webjars.npm:decompress
CVE-2020-2271 Vulnerability in maven package org.jenkins-ci.plugins:locked-files-report
CVE-2020-2196 Vulnerability in maven package org.jenkins-ci.plugins:selenium
CVE-2020-15123 Vulnerability in npm package codecov
CVE-2016-10533 Vulnerability in npm package express-restify-mongoose