{ "id": "CVE-2024-28151", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.570", "lastModified": "2024-03-06T21:42:54.697", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Jenkins HTML Publisher Plugin 1.32 and earlier archives invalid symbolic links in report directories on agents and recreates them on the controller, allowing attackers with Item/Configure permission to determine whether a path on the Jenkins controller file system exists, without being able to access it." }, { "lang": "es", "value": "Jenkins HTML Publisher Plugin 1.32 y versiones anteriores archiva enlaces simb\u00f3licos no v\u00e1lidos en directorios de informes de agentes y los recrea en el controlador, lo que permite a los atacantes con permiso Item/Configure determinar si existe una ruta en el sistema de archivos del controlador Jenkins, sin poder acceder a ella." } ], "metrics": {}, "references": [ { "url": "https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3303", "source": "jenkinsci-cert@googlegroups.com" } ] }