Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-28677
HistoryApr 02, 2023 - 9:15 p.m.

Code injection

2023-04-0221:15:00
PRIOn knowledge base
www.prio-n.com
4
code injection
jenkins
pipeline plugin
security issue
freestyle projects

9.1 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.0%

Jenkins Convert To Pipeline Plugin 1.0 and earlier uses basic string concatenation to convert Freestyle projects’ Build Environment, Build Steps, and Post-build Actions to the equivalent Pipeline step invocations, allowing attackers able to configure Freestyle projects to prepare a crafted configuration that injects Pipeline script code into the (unsandboxed) Pipeline resulting from a convertion by Jenkins Convert To Pipeline Plugin.

CPENameOperatorVersion
convert_to_pipelinele1.0

9.1 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.0%

Related for PRION:CVE-2023-28677