Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-1574 | Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. |
![]() |
GHSA-x3m3-g8w6-mf28 | Agent-to-controller security bypass in Jenkins Semantic Versioning Plugin |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T05:25:32.222Z
Reserved: 2022-03-15T00:00:00
Link: CVE-2022-27201

No data.

Status : Modified
Published: 2022-03-15T17:15:10.527
Modified: 2024-11-21T06:55:23.930
Link: CVE-2022-27201

No data.

No data.