Lucene search

K
cvelistJenkinsCVELIST:CVE-2022-27201
HistoryMar 15, 2022 - 4:45 p.m.

CVE-2022-27201

2022-03-1516:45:46
jenkins
www.cve.org

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.0%

Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

CNA Affected

[
  {
    "product": "Jenkins Semantic Versioning Plugin",
    "vendor": "Jenkins project",
    "versions": [
      {
        "lessThanOrEqual": "1.13",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.0%

Related for CVELIST:CVE-2022-27201