Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
2022-03-15T17:15:10.527
2024-11-21T06:55:23.930
Modified
CVSSv3.1: 6.5 (MEDIUM)
AV:N/AC:L/Au:S/C:P/I:N/A:N
8.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | jenkins | semantic_versioning | ≤ 1.13 | Yes |
Application | jenkins | jenkins | ≤ 2.303.2 | No |
Application | jenkins | jenkins | ≤ 2.318 | No |