Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8vfc-fcr2-47pj | Path traversal in Jenkins REPO Plugin |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T07:03:39.748Z
Reserved: 2022-05-16T00:00:00
Link: CVE-2022-30949
No data.
Status : Modified
Published: 2022-05-17T15:15:08.963
Modified: 2024-11-21T07:03:36.857
Link: CVE-2022-30949
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA