Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T05:25:32.222Z
Reserved: 2022-03-15T00:00:00
Link: CVE-2022-27201

No data.

Status : Modified
Published: 2022-03-15T17:15:10.527
Modified: 2024-11-21T06:55:23.930
Link: CVE-2022-27201

No data.