Description
Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7209 | Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system. |
Github GHSA |
GHSA-3g9q-cmgv-g4p6 | Arbitrary file read vulnerability in Jenkins Pipeline Utility Steps Plugin |
References
History
Wed, 30 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-04-30T14:11:11.808Z
Reserved: 2022-11-14T00:00:00.000Z
Link: CVE-2022-45381
Updated: 2024-08-03T14:09:57.000Z
Status : Modified
Published: 2022-11-15T20:15:11.567
Modified: 2025-04-30T15:15:59.470
Link: CVE-2022-45381
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA