Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-117s-ujg4-cyfk
Summary
Jenkins HTML Publisher Plugin Path traversal vulnerability
Jenkins HTML Publisher Plugin 1.32 and earlier archives invalid symbolic links in report directories on agents and recreates them on the controller, allowing attackers with Item/Configure permission to determine whether a path on the Jenkins controller file system exists, without being able to access it.
Aliases
0
alias CVE-2024-28151
1
alias GHSA-478x-m3mx-7j3f
Fixed_packages
0
url pkg:maven/org.jenkins-ci.plugins/htmlpublisher@1.32.1
purl pkg:maven/org.jenkins-ci.plugins/htmlpublisher@1.32.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/htmlpublisher@1.32.1
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28151.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28151
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43175
published_at 2026-05-14T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43353
published_at 2026-04-12T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43338
published_at 2026-04-13T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43398
published_at 2026-04-16T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43388
published_at 2026-04-18T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43323
published_at 2026-04-21T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43256
published_at 2026-04-24T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43259
published_at 2026-04-26T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.4318
published_at 2026-04-29T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.43048
published_at 2026-05-05T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43125
published_at 2026-05-07T12:55:00Z
11
value 0.00209
scoring_system epss
scoring_elements 0.43142
published_at 2026-05-09T12:55:00Z
12
value 0.00209
scoring_system epss
scoring_elements 0.43081
published_at 2026-05-11T12:55:00Z
13
value 0.00209
scoring_system epss
scoring_elements 0.43111
published_at 2026-05-12T12:55:00Z
14
value 0.00209
scoring_system epss
scoring_elements 0.43331
published_at 2026-04-02T12:55:00Z
15
value 0.00209
scoring_system epss
scoring_elements 0.4336
published_at 2026-04-04T12:55:00Z
16
value 0.00209
scoring_system epss
scoring_elements 0.43297
published_at 2026-04-07T12:55:00Z
17
value 0.00209
scoring_system epss
scoring_elements 0.43349
published_at 2026-04-08T12:55:00Z
18
value 0.00209
scoring_system epss
scoring_elements 0.43364
published_at 2026-04-09T12:55:00Z
19
value 0.00209
scoring_system epss
scoring_elements 0.43385
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28151
2
reference_url https://github.com/jenkinsci/htmlpublisher-plugin
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/htmlpublisher-plugin
3
reference_url https://github.com/jenkinsci/htmlpublisher-plugin/commit/6b840248dd0d691bbac9b515cd750b3f925909b2
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/htmlpublisher-plugin/commit/6b840248dd0d691bbac9b515cd750b3f925909b2
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-28151
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-28151
5
reference_url https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3303
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-07T16:34:15Z/
url https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3303
6
reference_url http://www.openwall.com/lists/oss-security/2024/03/06/3
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-07T16:34:15Z/
url http://www.openwall.com/lists/oss-security/2024/03/06/3
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2268229
reference_id 2268229
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2268229
8
reference_url https://github.com/advisories/GHSA-478x-m3mx-7j3f
reference_id GHSA-478x-m3mx-7j3f
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-478x-m3mx-7j3f
Weaknesses
0
cwe_id 22
name Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
description The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score4.0 - 6.9
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-117s-ujg4-cyfk