Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-45381

Опубликовано: 15 нояб. 2022
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.

A flaw was found in the Pipeline Utility Steps Jenkins Plugin. The affected version of the Pipeline Utility Steps Plugin does not restrict the set of enabled prefix interpolators and bundles versions of this library that enable the file: prefix interpolator by default. This flaw allows attackers who can configure Pipelines to read arbitrary files from the Jenkins controller file system.

Отчет

OpenShift 3.11 is already in the ELS support model phase. The Jenkins components are out of scope of the ELS support; hence the OpenShift 3.11 Jenkins component is marked in this CVE as out of support scope.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Developer Tools and Servicesjenkins-2-pluginsAffected
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsOut of support scope
Red Hat OpenShift Container Platform 4.10jenkins-2-pluginsFixedRHSA-2023:056008.02.2023
Red Hat OpenShift Container Platform 4.9jenkins-2-pluginsFixedRHSA-2023:077723.02.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2143089jenkins-plugin/pipeline-utility-steps: Arbitrary file read vulnerability in Pipeline Utility Steps Plugin

EPSS

Процентиль: 45%
0.00224
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
около 3 лет назад

Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.

CVSS3: 7.5
github
около 3 лет назад

Arbitrary file read vulnerability in Jenkins Pipeline Utility Steps Plugin

EPSS

Процентиль: 45%
0.00224
Низкий

8.1 High

CVSS3