CVE-2022-25178

Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier does not restrict the names of resources passed to the libraryResource step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.
References
Link Resource
https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613 Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:pipeline\:shared_groovy_libraries:*:*:*:*:*:jenkins:*:*

History

24 Feb 2022, 01:58

Type Values Removed Values Added
First Time Jenkins pipeline\
Jenkins
References (CONFIRM) https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613 - (CONFIRM) https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613 - Issue Tracking, Patch, Vendor Advisory
CWE CWE-22
CPE cpe:2.3:a:jenkins:pipeline\:shared_groovy_libraries:*:*:*:*:*:jenkins:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 6.5

15 Feb 2022, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-15 17:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-25178

Mitre link : CVE-2022-25178

CVE.ORG link : CVE-2022-25178


JSON object : View

Products Affected

jenkins

  • pipeline\
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')