vulnerability
Red Hat OpenShift: CVE-2022-45381: jenkins-plugin/pipeline-utility-steps: Arbitrary file read vulnerability in Pipeline Utility Steps Plugin
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:S/C:C/I:C/A:N) | Nov 15, 2022 | Feb 9, 2023 | Aug 11, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:N)
Published
Nov 15, 2022
Added
Feb 9, 2023
Modified
Aug 11, 2025
Description
Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.
Solution
linuxrpm-upgrade-jenkins-2-plugins
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.