CVE-2022-25173OS Command Injection in Project Jenkins Pipeline Groovy Plugin

Severity
8.8HIGHNVD
EPSS
0.2%
top 59.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 15
Latest updateFeb 16

Description

Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier uses the same checkout directories for distinct SCMs when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5jenkins_project/jenkins_pipeline_groovy_pluginunspecified2648.va9433432b33c
NVDjenkins/pipeline2648.va9433432b33c

Patches

🔴Vulnerability Details

3
GHSA
Improper Neutralization of Special Elements used in an OS Command in Jenkins Pipeline: Groovy Plugin2022-02-16
OSV
Improper Neutralization of Special Elements used in an OS Command in Jenkins Pipeline: Groovy Plugin2022-02-16
CVEList
CVE-2022-25173: Jenkins Pipeline: Groovy Plugin 26482022-02-15

📋Vendor Advisories

2
Red Hat
workflow-cps: OS command execution through crafted SCM contents2022-02-15
Jenkins
Jenkins Security Advisory 2022-02-152022-02-15
CVE-2022-25173 — OS Command Injection | cvebase