Description
util/FileDownloadUtils.java in FileDownloader 1.7.3 does not check an attachment's name. If an attacker places "../" in the file name, the file can be stored in an unintended directory because of Directory Traversal.
Remediation
References
https://github.com/lingochamp/FileDownloader/issues/1028
Related Vulnerabilities
CVE-2019-10462 Vulnerability in maven package org.jenkins-ci.plugins:dynatrace-dashboard
CVE-2020-2286 Vulnerability in maven package org.jenkins-ci.plugins:role-strategy
CVE-2023-38704 Vulnerability in npm package import-in-the-middle
CVE-2019-1010266 Vulnerability in maven package org.webjars.bowergithub.lodash:lodash