Insufficient Access Control in Jenkins Mercurial Plugin
CVE-2022-30948
7.5HIGH
Summary
The Jenkins Mercurial Plugin version 2.16 and older versions have a vulnerability that allows users who can configure pipelines to access and check out certain source control management (SCM) repositories using local file system paths. This can lead to unauthorized access to project information stored within the Jenkins controller, potentially exposing sensitive data from other projects. This vulnerability highlights the importance of secure path handling and proper access control mechanisms within CI/CD environments.
Affected Version(s)
Jenkins Mercurial Plugin <= 2.16
Jenkins Mercurial Plugin 2.15.1
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved