First published: Tue May 17 2022(Updated: )
Jenkins Pipeline: Groovy Plugin 2689.v434009a_31b_f1 and earlier allows loading any Groovy source files on the classpath of Jenkins and Jenkins plugins in sandboxed pipelines.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.8.1672842762-1.el8 | 2-plugins-0:4.8.1672842762-1.el8 |
Jenkins Pipeline\ | <2689.v434009a_31b_f1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30945 is classified as a high severity vulnerability due to its potential impact on Jenkins installations.
To fix CVE-2022-30945, upgrade the Jenkins Pipeline: Groovy Plugin to version 2689.v434009a_31b_f2 or later.
CVE-2022-30945 allows unauthorized loading of Groovy source files in sandboxed pipelines, potentially leading to code execution risk.
CVE-2022-30945 affects Jenkins Pipeline: Groovy Plugin versions 2689.v434009a_31b_f1 and earlier.
Yes, CVE-2022-30945 can potentially lead to remote code execution through the exploitation of Groovy scripts in Jenkins.