CVE-2022-45381

Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:pipeline_utility_steps:*:*:*:*:*:jenkins:*:*

History

No history.

Information

Published : 2022-11-15 20:15

Updated : 2023-11-22 04:23


NVD link : CVE-2022-45381

Mitre link : CVE-2022-45381

CVE.ORG link : CVE-2022-45381


JSON object : View

Products Affected

jenkins

  • pipeline_utility_steps
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')