[JENKINS:SECURITY-2422] Sandbox bypass vulnerability in `workflow-cps-global-lib`

Severity High
Affected Packages 2
Fixed Packages 2
CVEs 1

workflow-cps-global-lib 552.vd9cc05b8a2e1 and earlier uses the names of Pipeline libraries to create directories without canonicalization or sanitization.

This allows attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM using specially crafted library names if a global Pipeline library is already configured.

workflow-cps-global-lib 561.va_ce0de3c2d69 sanitizes the names of Pipeline libraries when creating library directories.

ID
JENKINS:SECURITY-2422
Severity
high
Published
2022-02-15T00:00:00
(2 years ago)
Modified
2022-02-15T00:00:00
(2 years ago)
Rights
Jenkins Security Team
Other Advisories
Source # ID Name URL
Plugin repository workflow-cps-global-lib repository https://github.com/jenkinsci/workflow-cps-global-lib-plugin
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/workflow-cps-global-lib org.jenkins-ci.plugins workflow-cps-global-lib <= 552.vd9cc05b8a2e1
Fixed pkg:maven/org.jenkins-ci.plugins/workflow-cps-global-lib org.jenkins-ci.plugins workflow-cps-global-lib = 561.va_ce0de3c2d69
Affected pkg:github/jenkinsci/workflow-cps-global-lib-plugin jenkinsci workflow-cps-global-lib-plugin <= 552.vd9cc05b8a2e1
Fixed pkg:github/jenkinsci/workflow-cps-global-lib-plugin jenkinsci workflow-cps-global-lib-plugin = 561.va_ce0de3c2d69
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...