CVE-2022-25183 is a vulnerability in Jenkins Pipeline
Published on February 15, 2022
Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier uses the names of Pipeline libraries to create cache directories without any sanitization, allowing attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM using specially crafted library names if a global Pipeline library configured to use caching already exists.
Products Associated with CVE-2022-25183
Want to know whenever a new CVE is published for Jenkins Pipeline? stack.watch will email you.
Affected Versions
Jenkins project Jenkins Pipeline: Shared Groovy Libraries Plugin:- Version unspecified, <= 552.vd9cc05b8a2e1 is affected.
- Version 2.21 and below unspecified is affected.
- Version 2.21.1 is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.