CVE-2022-27201
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/03/2022
Last modified:
22/11/2023
Description
Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:jenkins:semantic_versioning:*:*:*:*:*:jenkins:*:* | 1.13 (including) | |
| cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:* | 2.303.2 (including) | |
| cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:* | 2.318 (including) |
To consult the complete list of CPE names with products and versions, see this page



