Jenkins Conversion Plugin Vulnerability in Freestyle Projects
CVE-2023-28677
9.8CRITICAL
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 2 April 2023
Summary
The Jenkins Convert To Pipeline Plugin, version 1.0 and earlier, introduces a security concern where simple string concatenation mechanisms allow for the injection of untrusted Pipeline script code. This vulnerability enables attackers to craft configurations in Freestyle projects that manipulate the conversion process into unsandboxed Pipeline invocations, potentially compromising the integrity of the project configuration and execution.
Affected Version(s)
Jenkins Convert To Pipeline Plugin 0 <= 1.0
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved