Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier uses the same checkout directories for distinct SCMs when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/02/15/2 Mailing List Third Party Advisory
https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463 Issue Tracking Patch Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: jenkins

Published: 2022-02-15T16:10:50

Updated: 2023-10-24T14:19:28.402Z

Reserved: 2022-02-15T00:00:00


Link: CVE-2022-25173

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-02-15T17:15:08.477

Modified: 2023-11-30T19:13:14.137


Link: CVE-2022-25173

JSON object: View

cve-icon Redhat Information

No data.

CWE