← Retour aux CVEs
CVE-2025-58458
MEDIUM4.3
Description
In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Details CVE
Score CVSS v3.14.3
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie9/3/2025
Derniere modification11/4/2025
Sourcenvd
Observations honeypot0
Produits affectes
jenkins:git_client
Faiblesses (CWE)
CWE-200CWE-538
References
https://www.jenkins.io/security/advisory/2025-09-03/#SECURITY-3590(jenkinsci-cert@googlegroups.com)
http://www.openwall.com/lists/oss-security/2025/09/03/4(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.