CVE-2022-30949

Name
CVE-2022-30949
Description
Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MLIST http://www.openwall.com/lists/oss-security/2022/05/17/8
CONFIRM https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:jenkins:repo:*:*:*:*:*:jenkins:*:* jenkins >= None <= 1.14.0
cpe:2.3:a:jenkins:git:*:*:*:*:*:jenkins:*:* jenkins >= None <= 4.11.1
cpe:2.3:a:jenkins:mercurial:*:*:*:*:*:jenkins:*:* jenkins >= None <= 2.16

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
jenkins edge-community 2.332.3-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins 3.16-community 2.332.3-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable