← Volver a CVEs
CVE-2025-58458
MEDIUM4.3
Descripcion
In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Detalles CVE
Puntuacion CVSS v3.14.3
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado9/3/2025
Ultima modificacion11/4/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
jenkins:git_client
Debilidades (CWE)
CWE-200CWE-538
Referencias
https://www.jenkins.io/security/advisory/2025-09-03/#SECURITY-3590(jenkinsci-cert@googlegroups.com)
http://www.openwall.com/lists/oss-security/2025/09/03/4(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.