Description
Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier uses the same checkout directories for distinct SCMs for the readTrusted step, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1130 | Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier uses the same checkout directories for distinct SCMs for the readTrusted step, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents. |
Github GHSA |
GHSA-pj84-qjm3-77mg | Jenkins Pipeline: Multibranch Plugin vulnerable to OS Command Injection |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T04:36:06.194Z
Reserved: 2022-02-15T00:00:00.000Z
Link: CVE-2022-25175
No data.
Status : Modified
Published: 2022-02-15T17:15:08.627
Modified: 2024-11-21T06:51:45.170
Link: CVE-2022-25175
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA