Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-0629 Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository.
Github GHSA Github GHSA GHSA-jpxj-vgq5-prjc OS command execution vulnerability in Jenkins Docker Commons Plugin
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-03T02:17:52.926Z

Reserved: 2021-10-28T00:00:00

Link: CVE-2022-20617

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-12T20:15:08.907

Modified: 2024-11-21T06:43:10.183

Link: CVE-2022-20617

cve-icon Redhat

Severity : Important

Publid Date: 2022-01-12T00:00:00Z

Links: CVE-2022-20617 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses