mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
68 lines
2.3 KiB
JSON
68 lines
2.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2022-30949",
|
|
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Jenkins project",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Jenkins REPO Plugin",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "1.14.0",
|
|
"version_affected": "<="
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-435: Improper Interaction Between Multiple Correctly-Behaving Entities"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478",
|
|
"url": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478",
|
|
"refsource": "CONFIRM"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[oss-security] 20220517 Multiple vulnerabilities in Jenkins plugins",
|
|
"url": "http://www.openwall.com/lists/oss-security/2022/05/17/8"
|
|
}
|
|
]
|
|
}
|
|
} |