{
  "threat_severity" : "Important",
  "public_date" : "2018-05-09T00:00:00Z",
  "bugzilla" : {
    "description" : "jenkins: Path traversal vulnerability in agent to master security subsystem (SECURITY-788)",
    "id" : "1576711",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1576711"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "draft"
  },
  "cwe" : "CWE-22",
  "details" : [ "A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection." ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift Enterprise 3",
    "fix_state" : "Affected",
    "package_name" : "jenkins",
    "cpe" : "cpe:/a:redhat:openshift:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2018-1000194\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-1000194\nhttps://jenkins.io/security/advisory/2018-05-09/" ],
  "name" : "CVE-2018-1000194",
  "csaw" : false
}