cve/2022/CVE-2022-27201.md
2024-05-25 21:48:12 +02:00

19 lines
951 B
Markdown

### [CVE-2022-27201](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27201)
![](https://img.shields.io/static/v1?label=Product&message=Jenkins%20Semantic%20Versioning%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%3D%201.13%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/jenkinsci-cert/nvd-cwe