First published: Tue Feb 15 2022(Updated: )
A flaw was found in Jenkins. The Pipeline: Shared Groovy Libraries Plugin uses the same workspace directory for all checkouts of Pipeline libraries with the same name, regardless of the SCM used and the source of the library configuration. This flaw allows attackers with item/configure permission to execute arbitrary code in the context of the Jenkins controller, JVM, through crafted SCM contents if a global Pipeline library already exists.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:3.11.1650371376-1.el7 | 2-plugins-0:3.11.1650371376-1.el7 |
redhat/jenkins | <2-plugins-0:4.10.1647505461-1.el8 | 2-plugins-0:4.10.1647505461-1.el8 |
redhat/jenkins | <2-plugins-0:4.6.1650364520-1.el8 | 2-plugins-0:4.6.1650364520-1.el8 |
redhat/jenkins | <2-plugins-0:4.7.1648800585-1.el8 | 2-plugins-0:4.7.1648800585-1.el8 |
redhat/jenkins | <2-plugins-0:4.8.1646993358-1.el8 | 2-plugins-0:4.8.1646993358-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1647580879-1.el8 | 2-plugins-0:4.9.1647580879-1.el8 |
Jenkins Pipeline\ | <=552.vd9cc05b8a2e1 | |
maven/org.jenkins-ci.plugins.workflow:workflow-cps-global-lib | <=552.vd9cc05b8a2e1 | 561.va_ce0de3c2d69 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-25181 has been classified as a medium severity vulnerability.
To fix CVE-2022-25181, you should upgrade to a version of the Jenkins Pipeline: Shared Groovy Libraries Plugin that is not affected, specifically versions later than 552.vd9cc05b8a2e1.
CVE-2022-25181 affects Jenkins and specifically the Pipeline: Shared Groovy Libraries Plugin.
CVE-2022-25181 is a directory traversal vulnerability related to workspace directory usage in Jenkins.
CVE-2022-25181 requires attackers to have item/configure permissions, indicating a need for authenticated access.