Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-30948

Опубликовано: 17 мая 2022
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Jenkins Mercurial Plugin 2.16 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.

A flaw was found in the Jenkins plugin. Affected versions of the Jenkins Mercurial Plugin allow attackers who can configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system. This is accomplished by using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsWill not fix
Red Hat OpenShift Container Platform 4.8jenkins-2-pluginsFixedRHSA-2023:001712.01.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-435
https://bugzilla.redhat.com/show_bug.cgi?id=2119644plugin: Mercurial SCM plugin can check out from the controller file system

EPSS

Процентиль: 87%
0.03261
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 3 лет назад

Jenkins Mercurial Plugin 2.16 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.

CVSS3: 3.7
github
больше 3 лет назад

Path traversal in Jenkins Mercurial Plugin

EPSS

Процентиль: 87%
0.03261
Низкий

7.5 High

CVSS3