First published: Tue Feb 15 2022(Updated: )
Jenkins HashiCorp Vault Plugin 336.v182c0fbaaeb7 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.datapipe.jenkins.plugins:hashicorp-vault-plugin | <=336.v182c0fbaaeb7 | 351.vdb_f83a_1c6a_9d |
HashiCorp Vault | <=336.v182c0fbaaeb7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25197 has a high severity level due to the potential for unauthorized file access on the Jenkins controller.
To remediate CVE-2022-25197, update the Jenkins HashiCorp Vault Plugin to version 351.vdb_f83a_1c6a_9d or later.
CVE-2022-25197 affects Jenkins installations using the HashiCorp Vault Plugin version 336.v182c0fbaaeb7 or earlier.
Attackers could exploit CVE-2022-25197 to read arbitrary files from the Jenkins controller's file system.
Yes, CVE-2022-25197 can be exploited remotely if an attacker has access to Jenkins agent processes.