First published: Tue Feb 15 2022(Updated: )
A flaw was found in Jenkins. The Pipeline: Groovy Plugin follows symbolic links to locations outside of the checkout directory for the configured SCM when reading the script file (typically Jenkinsfile) for Pipelines. This flaw allows attackers who can configure Pipelines to read arbitrary files on the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins.workflow:workflow-cps | >=2.95<2648.2651.v230593e03e9f | 2648.2651.v230593e03e9f |
maven/org.jenkins-ci.plugins.workflow:workflow-cps | <2.92.1 | 2.92.1 |
maven/org.jenkins-ci.plugins.workflow:workflow-cps | >=2.93<2.94.1 | 2.94.1 |
redhat/jenkins | <2-plugins-0:3.11.1650371376-1.el7 | 2-plugins-0:3.11.1650371376-1.el7 |
redhat/jenkins | <2-plugins-0:4.10.1647505461-1.el8 | 2-plugins-0:4.10.1647505461-1.el8 |
redhat/jenkins | <2-plugins-0:4.6.1650364520-1.el8 | 2-plugins-0:4.6.1650364520-1.el8 |
redhat/jenkins | <2-plugins-0:4.7.1648800585-1.el8 | 2-plugins-0:4.7.1648800585-1.el8 |
redhat/jenkins | <2-plugins-0:4.8.1646993358-1.el8 | 2-plugins-0:4.8.1646993358-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1647580879-1.el8 | 2-plugins-0:4.9.1647580879-1.el8 |
Jenkins Pipeline | <=2648.va9433432b33c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-25176 is considered a moderate severity vulnerability.
To resolve CVE-2022-25176, upgrade to Jenkins Pipeline: Groovy Plugin versions specified in the patch notes, ensuring your installation is not on the affected versions.
CVE-2022-25176 affects specific versions of the Jenkins Pipeline: Groovy Plugin prior to the patched versions listed in the advisory.
CVE-2022-25176 is a path traversal vulnerability that allows unauthorized file access.
Attackers who can configure Pipelines in Jenkins are at risk of exploiting CVE-2022-25176 to read arbitrary files.