Local Path Disclosure in Jenkins Git Plugin Affects Security & Data Privacy
CVE-2022-30947
7.5HIGH
Summary
The Jenkins Git Plugin version 4.11.1 and earlier is susceptible to a local path disclosure vulnerability, where users with pipeline configuration permissions can access the file system of the Jenkins controller. This issue arises when attackers exploit the ability to check out Source Code Management (SCM) repositories using local paths as URLs, which could inadvertently expose limited information about other projects' SCM data. Organizations must review and secure pipeline configurations to mitigate potential data exposure and ensure robust security practices.
Affected Version(s)
Jenkins Git Plugin <= 4.11.1
Jenkins Git Plugin 4.9.1
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved