Jenkins Git client Plugin file system information disclosure vulnerability
Moderate severity
GitHub Reviewed
Published
Sep 3, 2025
to the GitHub Advisory Database
•
Updated Sep 3, 2025
Description
Published by the National Vulnerability Database
Sep 3, 2025
Published to the GitHub Advisory Database
Sep 3, 2025
Reviewed
Sep 3, 2025
Last updated
Sep 3, 2025
In Jenkins Git client Plugin 6.3.2 and earlier, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying
amazon-s3
protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.References