Description
A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.
Remediation
References
https://jenkins.io/security/advisory/2018-10-10/#SECURITY-867
Related Vulnerabilities
CVE-2023-39685 Vulnerability in maven package org.hjson:hjson
CVE-2018-1000183 Vulnerability in maven package com.coravy.hudson.plugins.github:github
CVE-2018-1000012 Vulnerability in maven package org.jvnet.hudson.plugins:warnings
CVE-2022-34870 Vulnerability in maven package org.apache.geode:geode-pulse
CVE-2022-2668 Vulnerability in maven package org.keycloak:keycloak-saml-core