CVE-2022-25178

Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier does not restrict the names of resources passed to the libraryResource step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.
References
Link Resource
https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613 Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:pipeline\:shared_groovy_libraries:*:*:*:*:*:jenkins:*:*

History

24 Feb 2022, 01:58

Type Values Removed Values Added
CPE cpe:2.3:a:jenkins:pipeline\:shared_groovy_libraries:*:*:*:*:*:jenkins:*:*
CWE CWE-22
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 6.5
References (CONFIRM) https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613 - (CONFIRM) https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613 - Issue Tracking, Patch, Vendor Advisory

15 Feb 2022, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-15 17:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-25178

Mitre link : CVE-2022-25178

CVE.ORG link : CVE-2022-25178


JSON object : View

Products Affected

jenkins

  • pipeline\
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')