CVE-2022-45381

Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:pipeline_utility_steps:*:*:*:*:*:jenkins:*:*

Information

Published : 2022-11-15 12:15

Updated : 2022-11-29 06:19


NVD link : CVE-2022-45381

Mitre link : CVE-2022-45381


JSON object : View

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Advertisement

dedicated server usa

Products Affected

jenkins

  • pipeline_utility_steps