OS Command Execution Vulnerability in Jenkins Docker Commons Plugin
CVE-2022-20617
8.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 12 January 2022
Summary
The Jenkins Docker Commons Plugin prior to version 1.18 is vulnerable to an OS command execution flaw. This vulnerability arises from improper sanitization of user-input image names and tags, which can potentially allow attackers with 'Item/Configure' permissions or those able to manipulate the contents of a configured job's source code management (SCM) repository to execute arbitrary commands on the host operating system. Careful validation of input values is essential to mitigate this risk and ensure the security of Jenkins environments.
Affected Version(s)
Jenkins Docker Commons Plugin <= 1.17
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved