First published: Tue Feb 15 2022(Updated: )
A flaw was found in Jenkins. The Pipeline: Shared Groovy Libraries does not restrict the names of resources passed to the libraryResource step. This flaw allows attackers who can configure Pipelines to read arbitrary files on the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins.workflow:workflow-cps-global-lib | <2.18.1 | 2.18.1 |
maven/org.jenkins-ci.plugins.workflow:workflow-cps-global-lib | >=2.19<2.21.1 | 2.21.1 |
maven/org.jenkins-ci.plugins.workflow:workflow-cps-global-lib | >=2.22<=552.vd9cc05b8a2e1 | 561.va_ce0de3c2d69 |
redhat/jenkins | <2-plugins-0:3.11.1650371376-1.el7 | 2-plugins-0:3.11.1650371376-1.el7 |
redhat/jenkins | <2-plugins-0:4.10.1647505461-1.el8 | 2-plugins-0:4.10.1647505461-1.el8 |
redhat/jenkins | <2-plugins-0:4.6.1650364520-1.el8 | 2-plugins-0:4.6.1650364520-1.el8 |
redhat/jenkins | <2-plugins-0:4.7.1648800585-1.el8 | 2-plugins-0:4.7.1648800585-1.el8 |
redhat/jenkins | <2-plugins-0:4.8.1646993358-1.el8 | 2-plugins-0:4.8.1646993358-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1647580879-1.el8 | 2-plugins-0:4.9.1647580879-1.el8 |
Jenkins Pipeline | <=552.vd9cc05b8a2e1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-25178 is rated as a high severity vulnerability due to its potential to expose sensitive files on the Jenkins controller.
To remediate CVE-2022-25178, upgrade the Pipeline: Shared Groovy Libraries to version 2.18.1 or the appropriate version specified in the advisory.
CVE-2022-25178 allows attackers to exploit the Pipeline: Shared Groovy Libraries and read arbitrary files from the Jenkins file system, posing a significant security risk.
CVE-2022-25178 affects versions of Jenkins prior to 2.18.1 and specific versions in the 2.19 to 2.21.1 range.
If an upgrade is not possible, consider restricting access to pipeline configurations and monitoring for unauthorized changes to mitigate the risk associated with CVE-2022-25178.