Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller’s file system using local paths as SCM URLs, obtaining limited information about other projects’ SCM contents. Versions 1.14.1 and 1.15.0 have been updated to reject local file paths being checked out on the controller.
References
- https://nvd.nist.gov/vuln/detail/CVE-2022-30949
- https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
- http://www.openwall.com/lists/oss-security/2022/05/17/8
- https://github.com/jenkinsci/repo-plugin/commit/8c9cbb88baffc64d1b63183235eb86c773108235
- https://github.com/advisories/GHSA-8vfc-fcr2-47pj