CVE-2022-30948: Path traversal in Jenkins Mercurial Plugin
3.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.8468%
CWE
Published
5/18/2022
Updated
1/28/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:mercurial | maven | <= 2.16 | 2.16.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the checkout method's lack of validation for local path-based SCM URLs when executed on the Jenkins controller (non-remote workspace). The patch introduced a new abortIfSourceLocal()
check to block local paths unless explicitly allowed, confirming the original method's insecure behavior. The added test cases in Security2478Test.java
explicitly validate this scenario, demonstrating that the pre-patch checkout method permitted insecure local checkouts.