Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7209 | Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system. |
Github GHSA |
GHSA-3g9q-cmgv-g4p6 | Arbitrary file read vulnerability in Jenkins Pipeline Utility Steps Plugin |
Wed, 30 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-04-30T14:11:11.808Z
Reserved: 2022-11-14T00:00:00.000Z
Link: CVE-2022-45381
Updated: 2024-08-03T14:09:57.000Z
Status : Modified
Published: 2022-11-15T20:15:11.567
Modified: 2025-04-30T15:15:59.470
Link: CVE-2022-45381
OpenCVE Enrichment
No data.
EUVD
Github GHSA