### [CVE-2022-27201](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27201) ![](https://img.shields.io/static/v1?label=Product&message=Jenkins%20Semantic%20Versioning%20Plugin&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%3D%201.13%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/jenkinsci-cert/nvd-cwe