First published: Tue Apr 12 2022(Updated: )
Jenkins Pipeline: Shared Groovy Libraries Plugin 564.ve62a_4eb_b_e039 and earlier, except 2.21.3, allows attackers able to submit pull requests (or equivalent), but not able to commit directly to the configured SCM, to effectively change the Pipeline behavior by changing the definition of a dynamically retrieved library in their pull request, even if the Pipeline is configured to not trust them.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.12.1675702407-1.el8 | 2-plugins-0:4.12.1675702407-1.el8 |
redhat/jenkins | <2-plugins-0:4.7.1652967082-1.el8 | 2-plugins-0:4.7.1652967082-1.el8 |
redhat/jenkins | <2-plugins-0:4.8.1672842762-1.el8 | 2-plugins-0:4.8.1672842762-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1651754460-1.el8 | 2-plugins-0:4.9.1651754460-1.el8 |
Jenkins Pipeline\ | <2.21.3 | |
Jenkins Pipeline\ | >=544.vff04fa68714d<566.vd0a_a_3334a_555 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-29047 is classified as a medium severity vulnerability that affects Jenkins Pipeline: Shared Groovy Libraries Plugin.
To fix CVE-2022-29047, upgrade to Jenkins Pipeline: Shared Groovy Libraries Plugin version 2.21.3 or later.
CVE-2022-29047 affects users of the Jenkins Pipeline: Shared Groovy Libraries Plugin version 564.ve62a_4eb_b_e039 and earlier.
CVE-2022-29047 allows unauthorized modification of pipeline behavior through pull requests.
There is no official workaround for CVE-2022-29047; upgrading to the fixed version is strongly recommended.