In Jenkins, files indicating when a plugin JPI file was last extracted into a subdirectory of plugins/ in the Jenkins home directory was accessible via HTTP by users with Overall/Read permission. This allowed unauthorized users to determine the likely install date of a given plugin. External Reference: https://jenkins.io/security/advisory/2018-07-18/#SECURITY-925
Created jenkins tracking bugs for this issue: Affects: fedora-all [bug 1609623]