Sandbox Bypass in Jenkins Pipeline: Shared Groovy Libraries Plugin
CVE-2022-25182
8.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 15 February 2022
Summary
The Jenkins Pipeline: Shared Groovy Libraries Plugin is susceptible to a sandbox bypass vulnerability. This flaw allows attackers with Item/Configure permissions to execute arbitrary code on the Jenkins controller JVM. The exploit is facilitated by using specially crafted library names when a global Pipeline library is already configured. Consequently, this can lead to unauthorized access and manipulation of the server's functionality.
Affected Version(s)
Jenkins Pipeline: Shared Groovy Libraries Plugin <= 552.vd9cc05b8a2e1
Jenkins Pipeline: Shared Groovy Libraries Plugin 2.21.1
Jenkins Pipeline: Shared Groovy Libraries Plugin 2.18.1
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved