Link Following in Jenkins Pipeline Multibranch Plugin
Moderate severity
GitHub Reviewed
Published
Feb 16, 2022
to the GitHub Advisory Database
•
Updated May 24, 2023
Package
Affected versions
>= 2.24, < 2.26.1
< 2.23.1
>= 696.v52535c46f4c9, < 696.698.v9b4218eea50f
>= 706.vd43c65dec013, < 707.v71c3f0a
Patched versions
2.26.1
2.23.1
696.698.v9b4218eea50f
707.v71c3f0a
Description
Published by the National Vulnerability Database
Feb 15, 2022
Published to the GitHub Advisory Database
Feb 16, 2022
Reviewed
Feb 25, 2022
Last updated
May 24, 2023
Jenkins Pipeline: Multibranch Plugin prior to 2.23.1, 2.26.1, 696.698.v9b4218eea50f, and 707.v71c3f0a_6ccdb_ follows symbolic links to locations outside of the checkout directory for the configured SCM when reading files using the readTrusted step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.
References