{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-25175","assignerOrgId":"39769cd5-e6e2-4dc8-927e-97b3aa056f5b","assignerShortName":"jenkins","dateUpdated":"2024-08-03T04:36:06.194Z","dateReserved":"2022-02-15T00:00:00.000Z","datePublished":"2022-02-15T00:00:00.000Z"},"containers":{"cna":{"affected":[{"product":"Jenkins Pipeline: Multibranch Plugin","vendor":"Jenkins project","versions":[{"status":"unaffected","version":"2.26.1"},{"status":"unaffected","version":"2.23.1"},{"status":"unaffected","version":"696.698.v9b4218eea50f"},{"lessThanOrEqual":"706.vd43c65dec013","status":"affected","version":"unspecified","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier uses the same checkout directories for distinct SCMs for the readTrusted step, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents."}],"providerMetadata":{"orgId":"39769cd5-e6e2-4dc8-927e-97b3aa056f5b","shortName":"jenkins","dateUpdated":"2023-10-24T14:19:31.495Z"},"references":[{"url":"https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T04:36:06.194Z"},"title":"CVE Program Container","references":[{"url":"https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463","tags":["x_transferred"]}]}]}}