Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to configure a multi-configuration (Matrix) job, or control the contents of a previously configured job’s SCM repository.
Yaml Axis Plugin 0.2.1 configures its YAML parser to only instantiate safe types.
{ "nvd_published_at": "2020-04-16T19:15:00Z", "cwe_ids": [ "CWE-502" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-12-16T23:00:17Z" }