OS Command Execution Vulnerability in Jenkins Docker Commons Plugin
CVE-2022-20617

8.8HIGH

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
12 January 2022

What is CVE-2022-20617?

The Jenkins Docker Commons Plugin prior to version 1.18 is vulnerable to an OS command execution flaw. This vulnerability arises from improper sanitization of user-input image names and tags, which can potentially allow attackers with 'Item/Configure' permissions or those able to manipulate the contents of a configured job's source code management (SCM) repository to execute arbitrary commands on the host operating system. Careful validation of input values is essential to mitigate this risk and ensure the security of Jenkins environments.

Affected Version(s)

Jenkins Docker Commons Plugin <= 1.17

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.