Jenkins Git client Plugin file system information disclosure vulnerability
Moderate severity
GitHub Reviewed
Published
Sep 3, 2025
to the GitHub Advisory Database
•
Updated Nov 5, 2025
Description
Published by the National Vulnerability Database
Sep 3, 2025
Published to the GitHub Advisory Database
Sep 3, 2025
Reviewed
Sep 3, 2025
Last updated
Nov 5, 2025
In Jenkins Git client Plugin 6.3.2 and earlier, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying
amazon-s3protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.References