CVE-2025-58458

Name
CVE-2025-58458
Description
In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
vendor-advisory https://www.jenkins.io/security/advisory/2025-09-03/#SECURITY-3590
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2025/09/03/4

Match rules

CPE URI Source package Min version Max version
jenkins-git-client-plugin >= 6.3.3 < *
jenkins-git-client-plugin >= 6.1.4 < 6.1.*
jenkins-git-client-plugin >= 6.2.1 < 6.2.*

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
jenkins edge-community 2.516.1-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins edge-community 2.479.1-r1 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins edge-community 2.479.1-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins 3.22-community 2.479.1-r1 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins 3.22-community 2.479.1-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable