Insecure File Access in Jenkins Pipeline Utility Steps Plugin from CloudBees
CVE-2022-45381
8.1HIGH
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 15 November 2022
What is CVE-2022-45381?
The Jenkins Pipeline Utility Steps Plugin versions 2.13.1 and prior have a significant vulnerability due to inadequate restrictions on enabled prefix interpolators. This oversight allows attackers, who can configure Pipelines, to exploit the 'file:' prefix interpolator by default. Consequently, they may gain unauthorized access to read sensitive files from the underlying Jenkins controller file system, leading to potential data leaks and system breaches.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Pipeline Utility Steps Plugin <= 2.13.1
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved