Description
Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading files using the readTrusted step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.
Remediation
References
https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613
Related Vulnerabilities
CVE-2023-37963 Vulnerability in maven package io.jenkins.plugins:benchmark-evaluator
CVE-2021-41165 Vulnerability in maven package org.webjars.npm:ckeditor4
CVE-2017-16042 Vulnerability in maven package org.webjars.npm:growl
CVE-2023-46651 Vulnerability in maven package io.jenkins.plugins:warnings-ng
CVE-2022-31018 Vulnerability in maven package com.typesafe.play:play_2.12