First published: Tue May 17 2022(Updated: )
Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:git | <4.11.2 | 4.11.2 |
maven/org.jenkins-ci.plugins:mercurial | <2.16.1 | 2.16.1 |
maven/org.jenkins-ci.plugins:repo | <1.14.1 | 1.14.1 |
Jenkins Repository Connector | <1.15.0 | |
Jenkins | <=4.11.1 | |
Mercurial | <=2.16 | |
Jenkins Repository Connector | <=1.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30949 is classified as a medium severity vulnerability.
To fix CVE-2022-30949, update the Jenkins Repo Plugin to version 1.14.1 or later.
CVE-2022-30949 affects Jenkins Repo Plugin versions 1.14.0 and earlier.
CVE-2022-30949 is a local path traversal vulnerability in the Jenkins Repo Plugin.
Attackers who can configure pipelines in Jenkins can exploit CVE-2022-30949 to access limited SCM information.