First published: Tue May 17 2022(Updated: )
Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Git | <=4.11.1 | |
Jenkins Mercurial | <=2.16 | |
Jenkins Repo | <=1.14.0 | |
maven/org.jenkins-ci.plugins:git | <4.11.2 | 4.11.2 |
maven/org.jenkins-ci.plugins:mercurial | <2.16.1 | 2.16.1 |
maven/org.jenkins-ci.plugins:repo | <1.14.1 | 1.14.1 |
Jenkins Repo | <1.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.