Improper Validation in Shared Groovy Libraries Plugin for Jenkins
CVE-2022-29047
5.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 12 April 2022
Summary
The Shared Groovy Libraries Plugin for Jenkins allows attackers, who can submit pull requests but cannot commit directly to the source code management (SCM) system, to alter the pipeline behavior. This is achieved by modifying the definition of a dynamically retrieved library within their pull request. Even if the pipeline is set to distrust these external submissions, the lack of proper validation enables the potential exploitation of this vulnerability, allowing unauthorized control over the pipeline execution.
Affected Version(s)
Jenkins Pipeline: Shared Groovy Libraries Plugin <= 564.ve62a_4eb_b_e039
Jenkins Pipeline: Shared Groovy Libraries Plugin 2.21.3
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved