Uploaded image for project: 'Jenkins'
  1. Jenkins
  2. JENKINS-6678

Workspace input field allows unwanted access to content outside of the workspace

    • Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Minor Minor
    • core
    • None

      In a jobs workspace browser, there is a input field, which allows unwanted acccess to content outside of the workspace. For example, one can enter "../config.xml" and it will return the job's config. Other combinations of "../../../../" end up redirecting to bogus urls, like "http://127.0.0.1:11111null/".

      Additional checks need to be made before performing any file resolution or url redirection that the target file is actually under the workspace currently being browsed.

      There is a potential security hazard here, if the input field resolves to an actual file which is outside of the workspace.

            Unassigned Unassigned
            user57 user57
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated: