ID: CVE-2022-30945

Last Modified: May 26, 2022

Jenkins Pipeline: Groovy Plugin 2689.v434009a_31b_f1 and earlier allows loading any Groovy source files on the classpath of Jenkins and Jenkins plugins in sandboxed pipelines.

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

User Interaction: None

Scope: Changed

Confidentiality: High

Integrity: High

Availability: High

Base Score: 10.0

Exploitability Score: 3.9

Impact Score: 6.0

CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Specialize CVSS-Score

Access Vector: Network

Access Complexity: Medium

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

Base Score: 6.8

Exploitability Score: 8.6

Impact Score: 6.4

CVSS V2: AV:N/AC:M/Au:N/C:P/I:P/A:P

Specialize CVSS-Score

CWE-552

Condition Configuration
OR
OR
Alle Schwachstellen für jenkins
                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:jenkins:pipeline\:_groovy:*:*:*:*:*:jenkins:*:*"/>
    </set>
    <prop key="program_influence" value="input"/>
    <prop key="range" value="remote"/>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <prop key="target" value="host"/>
    <set operator="or">
        <prop key="program_influence" value="input"/>
        <prop key="program_influence" value="output"/>
        <prop key="program_influence" value="existence"/>
    </set>
    <prop key="data" value="any"/>
    <set operator="or">
        <prop key="data_influence" value="read"/>
        <prop key="data_influence" value="write"/>
        <prop key="data_influence" value="delete"/>
    </set>
    <set operator="or">
        <prop key="range" value="remote"/>
        <prop key="range" value="local"/>
    </set>
</set>