Логотип exploitDog
bind:CVE-2022-25175
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-25175

Количество 3

Количество 3

redhat логотип

CVE-2022-25175

почти 4 года назад

Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier uses the same checkout directories for distinct SCMs for the readTrusted step, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2022-25175

почти 4 года назад

Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier uses the same checkout directories for distinct SCMs for the readTrusted step, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-pj84-qjm3-77mg

почти 4 года назад

Jenkins Pipeline: Multibranch Plugin vulnerable to OS Command Injection

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2022-25175

Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier uses the same checkout directories for distinct SCMs for the readTrusted step, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.

CVSS3: 8.8
1%
Низкий
почти 4 года назад
nvd логотип
CVE-2022-25175

Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier uses the same checkout directories for distinct SCMs for the readTrusted step, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.

CVSS3: 8.8
1%
Низкий
почти 4 года назад
github логотип
GHSA-pj84-qjm3-77mg

Jenkins Pipeline: Multibranch Plugin vulnerable to OS Command Injection

CVSS3: 8.8
1%
Низкий
почти 4 года назад

Уязвимостей на страницу