Insecure File Access in Jenkins Pipeline Utility Steps Plugin from CloudBees
CVE-2022-45381
8.1HIGH
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 15 November 2022
What is CVE-2022-45381?
The Jenkins Pipeline Utility Steps Plugin versions 2.13.1 and prior have a significant vulnerability due to inadequate restrictions on enabled prefix interpolators. This oversight allows attackers, who can configure Pipelines, to exploit the 'file:' prefix interpolator by default. Consequently, they may gain unauthorized access to read sensitive files from the underlying Jenkins controller file system, leading to potential data leaks and system breaches.
Affected Version(s)
Jenkins Pipeline Utility Steps Plugin <= 2.13.1