Sandbox Bypass in Jenkins Pipeline: Shared Groovy Libraries Plugin
CVE-2022-25181
8.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 15 February 2022
Summary
A vulnerability exists in the Jenkins Pipeline: Shared Groovy Libraries Plugin that allows attackers with Item/Configure permission to bypass the sandbox restrictions. This enables them to execute arbitrary code within the Jenkins controller's JVM through carefully crafted source control management (SCM) contents, as long as a global Pipeline library is present. This presents significant security risks to Jenkins environments, especially those using untrusted libraries.
Affected Version(s)
Jenkins Pipeline: Shared Groovy Libraries Plugin <= 552.vd9cc05b8a2e1
Jenkins Pipeline: Shared Groovy Libraries Plugin 2.21.1
Jenkins Pipeline: Shared Groovy Libraries Plugin 2.18.1
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved