Описание
Improper Neutralization of Special Elements used in an OS Command in Jenkins Pipeline: Shared Groovy Libraries Plugin
Jenkins Pipeline: Shared Groovy Libraries Plugin prior to 561.va_ce0de3c2d69, 2.21.1, and 2.18.1 uses the same checkout directories for distinct SCMs for Pipeline libraries, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2022-25174
- https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/ace0de3c2d691662021ea10306eeb407da6b6365
- https://github.com/CVEProject/cvelist/blob/e19344451ce1c4a4181b9f094b8fd38cd8d86c9f/2022/25xxx/CVE-2022-25174.json
- https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463
Пакеты
org.jenkins-ci.plugins.workflow:workflow-cps-global-lib
>= 544.vff04fa68714d, < 561.va
561.va
org.jenkins-ci.plugins.workflow:workflow-cps-global-lib
>= 2.19, < 2.21.1
2.21.1
org.jenkins-ci.plugins.workflow:workflow-cps-global-lib
< 2.18.1
2.18.1
Связанные уязвимости
Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier uses the same checkout directories for distinct SCMs for Pipeline libraries, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.
Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier uses the same checkout directories for distinct SCMs for Pipeline libraries, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.