mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-28 09:12:08 +00:00
19 lines
951 B
Markdown
19 lines
951 B
Markdown
### [CVE-2022-27201](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27201)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/jenkinsci-cert/nvd-cwe
|
|
|