Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2949 | Vendor Advisory |
Configurations
Information
Published : 2022-11-15 12:15
Updated : 2022-11-29 06:19
NVD link : CVE-2022-45381
Mitre link : CVE-2022-45381
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
jenkins
- pipeline_utility_steps