Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-03T07:03:39.748Z
Reserved: 2022-05-16T00:00:00
Link: CVE-2022-30949

No data.

Status : Modified
Published: 2022-05-17T15:15:08.963
Modified: 2024-11-21T07:03:36.857
Link: CVE-2022-30949

No data.