Multibranch Pipelines by default limit who can change the Pipeline definition from the Jenkinsfile. This is useful for SCMs like GitHub: Jenkins can build content from users without commit access, but who can submit pull requests, without granting them the ability to modify the Pipeline definition. In that case, Jenkins will just use the Pipeline definition in the pull request’s destination branch instead.
In Pipeline: Deprecated Groovy Libraries Plugin 564.ve62a4ebb_e039 and earlier the same protection does not apply to uses of the library
step with a retriever
argument pointing to a library in the current build’s repository and branch (e.g., library(…, retriever: legacySCM(scm))
). This allows attackers able to submit pull requests (or equivalent), but not able to commit directly to the configured SCM, to effectively change the Pipeline behavior by changing the library behavior in their pull request, even if the Pipeline is configured to not trust them.
Pipeline: Deprecated Groovy Libraries Plugin 566.vd0aa3334a_555 and 2.21.3 aborts library retrieval if the library would be retrieved from the same repository and revision as the current build, and the revision being built is untrusted.
{ "nvd_published_at": "2022-04-12T20:15:00Z", "github_reviewed_at": "2022-12-02T21:35:05Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-863" ] }