Jenkins Convert To Pipeline Plugin 1.0 and earlier uses basic string concatenation to convert Freestyle projects' Build Environment, Build Steps, and Post-build Actions to the equivalent Pipeline step invocations, allowing attackers able to configure Freestyle projects to prepare a crafted configuration that injects Pipeline script code into the (unsandboxed) Pipeline resulting from a convertion by Jenkins Convert To Pipeline Plugin.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-1224 Jenkins Convert To Pipeline Plugin 1.0 and earlier uses basic string concatenation to convert Freestyle projects' Build Environment, Build Steps, and Post-build Actions to the equivalent Pipeline step invocations, allowing attackers able to configure Freestyle projects to prepare a crafted configuration that injects Pipeline script code into the (unsandboxed) Pipeline resulting from a convertion by Jenkins Convert To Pipeline Plugin.
Github GHSA Github GHSA GHSA-7c44-m589-36w7 Jenkins Convert To Pipeline Plugin vulnerable to command injection
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 25 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-02-25T19:17:43.562Z

Reserved: 2023-03-20T19:59:08.757Z

Link: CVE-2023-28677

cve-icon Vulnrichment

Updated: 2024-08-02T13:43:23.740Z

cve-icon NVD

Status : Modified

Published: 2023-04-02T21:15:09.160

Modified: 2025-02-25T20:15:33.537

Link: CVE-2023-28677

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.