Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w598-25hm-jqx3

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

RCE vulnerability in Jenkins Pipeline: AWS Steps Plugin

Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to Pipeline: AWS Steps Plugin’s build steps.

Pipeline: AWS Steps Plugin 1.41 configures its YAML parser to only instantiate safe types.

Пакеты

Наименование

de.taimos:pipeline-aws

maven
Затронутые версииВерсия исправления

< 1.41

1.41

EPSS

Процентиль: 70%
0.00654
Низкий

8.8 High

CVSS3

Дефекты

CWE-20
CWE-502

Связанные уязвимости

CVSS3: 8.8
nvd
почти 6 лет назад

Jenkins Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

EPSS

Процентиль: 70%
0.00654
Низкий

8.8 High

CVSS3

Дефекты

CWE-20
CWE-502