CVE-2022-25181Protection Mechanism Failure in Project Jenkins Pipeline Shared Groovy Libraries Plugin

Severity
8.8HIGHNVD
EPSS
0.3%
top 47.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 15
Latest updateFeb 16

Description

A sandbox bypass vulnerability in Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier allows attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM through crafted SCM contents, if a global Pipeline library already exists.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5jenkins_project/jenkins_pipeline_shared_groovy_libraries_pluginunspecified552.vd9cc05b8a2e1
NVDjenkins/pipeline552.vd9cc05b8a2e1

Patches

🔴Vulnerability Details

3
GHSA
Jenkins Pipeline: Deprecated Groovy Libraries Plugin Protection Mechanism Failure2022-02-16
OSV
Jenkins Pipeline: Deprecated Groovy Libraries Plugin Protection Mechanism Failure2022-02-16
CVEList
CVE-2022-25181: A sandbox bypass vulnerability in Jenkins Pipeline: Shared Groovy Libraries Plugin 5522022-02-15

📋Vendor Advisories

2
Red Hat
workflow-cps-global-lib: Sandbox bypass vulnerability2022-02-15
Jenkins
Jenkins Security Advisory 2022-02-152022-02-15
CVE-2022-25181 — Protection Mechanism Failure | cvebase