Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:42884
HistoryAug 22, 2023 - 11:14 a.m.

Remote Code Execution (RCE)

2023-08-2211:14:09
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
8
jenkins
remote code execution
vulnerability
pipeline
string concatenation
build environment
malicious code

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

55.1%

org.jenkins-ci.plugins: convert-to-pipeline is vulnerable to Remote Code Execution (RCE). The vulnerability exists due to improperly converting the build environment, build steps, and post-build actions of freestyle projects to the corresponding pipeline step invocations via simple string concatenation, which allows an attacker to upload and execute malicious code onto the system.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

55.1%