First published: Tue Feb 15 2022(Updated: )
A flaw was found in Jenkins. The Pipeline: Multibranch uses the same checkout directories for distinct SCMs for the readTrusted step. This flaw allows attackers with item/configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.This allows attackers to compromise confidentiality, integrity, and availability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:3.11.1650371376-1.el7 | 2-plugins-0:3.11.1650371376-1.el7 |
redhat/jenkins | <2-plugins-0:4.10.1647505461-1.el8 | 2-plugins-0:4.10.1647505461-1.el8 |
redhat/jenkins | <2-plugins-0:4.6.1650364520-1.el8 | 2-plugins-0:4.6.1650364520-1.el8 |
redhat/jenkins | <2-plugins-0:4.7.1648800585-1.el8 | 2-plugins-0:4.7.1648800585-1.el8 |
redhat/jenkins | <2-plugins-0:4.8.1646993358-1.el8 | 2-plugins-0:4.8.1646993358-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1647580879-1.el8 | 2-plugins-0:4.9.1647580879-1.el8 |
Jenkins Pipeline\ | <=706.vd43c65dec013 | |
<=706.vd43c65dec013 | ||
maven/org.jenkins-ci.plugins.workflow:workflow-multibranch | <=706.vd43c65dec013 | 707.v71c3f0a_6ccdb |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-25175 has been rated as a high severity vulnerability due to its potential for remote code execution by attackers with specific permissions.
To fix CVE-2022-25175, ensure you update Jenkins and the affected workflow-multibranch plugin to the latest recommended versions.
CVE-2022-25175 affects Jenkins installations with the Pipeline: Multibranch feature that utilize shared checkout directories.
CVE-2022-25175 can be exploited by authenticated users who have 'item/configure' permissions on the Jenkins system.
The potential impacts of CVE-2022-25175 include execution of arbitrary OS commands on the Jenkins controller, leading to unauthorized access and control.