First published: Tue Mar 15 2022(Updated: )
Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Semantic Versioning | <=1.13 | |
Jenkins Jenkins | <=2.303.2 | |
Jenkins Jenkins | <=2.318 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Jenkins issue is CVE-2022-27201.
The title of this Jenkins vulnerability is 'Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message'.
The severity rating of CVE-2022-27201 is medium, with a CVSS score of 6.5.
Jenkins Semantic Versioning Plugin 1.13 and earlier versions are affected by CVE-2022-27201.
Attackers who can control agent processes can exploit CVE-2022-27201 by having Jenkins parse a crafted file.