CVE-2022-29047
Published Apr 12, 2022
Last updated a year ago
Overview
- Description
- Jenkins Pipeline: Shared Groovy Libraries Plugin 564.ve62a_4eb_b_e039 and earlier, except 2.21.3, allows attackers able to submit pull requests (or equivalent), but not able to commit directly to the configured SCM, to effectively change the Pipeline behavior by changing the definition of a dynamically retrieved library in their pull request, even if the Pipeline is configured to not trust them.
- Source
- jenkinsci-cert@googlegroups.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-863
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:jenkins:pipeline\\:_shared_groovy_libraries:*:*:*:*:*:jenkins:*:*", "vulnerable": true, "matchCriteriaId": "489F2972-DEED-44CD-8015-793619441E0D", "versionEndExcluding": "2.21.3" }, { "criteria": "cpe:2.3:a:jenkins:pipeline\\:_shared_groovy_libraries:*:*:*:*:*:jenkins:*:*", "vulnerable": true, "matchCriteriaId": "F2367196-D144-4B31-9047-1F7B2A9865D3", "versionEndExcluding": "566.vd0a_a_3334a_555", "versionStartIncluding": "544.vff04fa68714d" } ], "operator": "OR" } ] } ]