Description
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
Remediation
References
Related Vulnerabilities
WordPress Plugin WooCommerce Weight Based Shipping Cross-Site Request Forgery (5.4.1)
Joomla Incorrect Permission Assignment for Critical Resource Vulnerability (CVE-2011-4912)
MySQL CVE-2013-0367 Vulnerability (CVE-2013-0367)
WordPress Plugin Popup Maker-Popup for opt-ins, lead gen, & more Multiple Vulnerabilities (1.17.1)
WordPress Plugin Mobile Device Detection by 51Degrees Cross-Site Scripting (3.1.5.2)