CVE-2022-25179

Source
https://cve.org/CVERecord?id=CVE-2022-25179
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-25179.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-25179
Aliases
Downstream
Published
2022-02-15T17:15:08.907Z
Modified
2026-03-14T11:38:17.030304Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading files using the readTrusted step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "706.vd43c65dec013"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-25179.json"