Логотип exploitDog
bind:CVE-2022-45381
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-45381

Количество 3

Количество 3

redhat логотип

CVE-2022-45381

около 3 лет назад

Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2022-45381

около 3 лет назад

Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-3g9q-cmgv-g4p6

около 3 лет назад

Arbitrary file read vulnerability in Jenkins Pipeline Utility Steps Plugin

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2022-45381

Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.

CVSS3: 8.1
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-45381

Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.

CVSS3: 8.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-3g9q-cmgv-g4p6

Arbitrary file read vulnerability in Jenkins Pipeline Utility Steps Plugin

CVSS3: 7.5
0%
Низкий
около 3 лет назад

Уязвимостей на страницу