Arbitrary Code Execution in Jenkins Pipeline due to Unsanitized Library Names
CVE-2022-25183
8.8HIGH
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 15 February 2022
What is CVE-2022-25183?
The Shared Groovy Libraries Plugin for Jenkins can be exploited due to lack of sanitization in the naming of Pipeline libraries. This results in the creation of cache directories that may allow an attacker with Item/Configure permissions to execute arbitrary code on the Jenkins controller JVM. If a global Pipeline library configured to utilize caching exists, attackers can leverage specially crafted library names to compromise the system.
Affected Version(s)
Jenkins Pipeline: Shared Groovy Libraries Plugin <= 552.vd9cc05b8a2e1
Jenkins Pipeline: Shared Groovy Libraries Plugin 2.21
Jenkins Pipeline: Shared Groovy Libraries Plugin 2.21.1