-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:git | maven | <= 4.11.1 | 4.11.2 |
| org.jenkins-ci.plugins:mercurial | maven | <= 2.16 | 2.16.1 |
| org.jenkins-ci.plugins:repo | maven | <= 1.14.0 | 1.15.0 |
The vulnerability stems from SCM checkout functions allowing local file paths when executed on the Jenkins controller. The patches (GitSCM.java's abortIfSourceIsLocal(), MercurialSCM.java's abortIfSourceLocal(), RepoScm's ManifestValidator) explicitly add validation to block local paths in controller contexts. The vulnerable functions are the pre-patch versions of these checkout methods that lacked these security checks, as evidenced by: 1) The addition of path validation logic in all three plugins 2) Security tests verifying the blocking of local paths 3) CVE description specifying improper path limitation.
A Semantic Attack on Google Gemini - Read the Latest Research