logo

CVE-2022-25179 org.jenkins-ci.plugins.workflow:workflow-multibranch

Package

Manager: maven
Name: org.jenkins-ci.plugins.workflow:workflow-multibranch
Vulnerable Version: >=2.24 <2.26.1 || >=0 <2.23.1 || >=696.v52535c46f4c9 <696.698.v9b4218eea50f || >=706.vd43c65dec013 <707.v71c3f0a

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.01385 pctl0.79588

Details

Link Following in Jenkins Pipeline Multibranch Plugin Jenkins Pipeline: Multibranch Plugin prior to 2.23.1, 2.26.1, 696.698.v9b4218eea50f, and 707.v71c3f0a_6ccdb_ follows symbolic links to locations outside of the checkout directory for the configured SCM when reading files using the readTrusted step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.

Metadata

Created: 2022-02-16T00:01:33Z
Modified: 2023-05-24T14:25:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-2m9w-9xh2-wxc3/GHSA-2m9w-9xh2-wxc3.json
CWE IDs: ["CWE-59"]
Alternative ID: GHSA-2m9w-9xh2-wxc3
Finding: F076
Auto approve: 1