Description
Jenkins Convert To Pipeline Plugin 1.0 and earlier uses basic string concatenation to convert Freestyle projects' Build Environment, Build Steps, and Post-build Actions to the equivalent Pipeline step invocations, allowing attackers able to configure Freestyle projects to prepare a crafted configuration that injects Pipeline script code into the (unsandboxed) Pipeline resulting from a convertion by Jenkins Convert To Pipeline Plugin.
Remediation
References
https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2966
Related Vulnerabilities
CVE-2016-4432 Vulnerability in maven package org.apache.qpid:qpid-broker-plugins-amqp-0-8-protocol
CVE-2018-1000407 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2023-34442 Vulnerability in maven package org.apache.camel:camel-jira
CVE-2023-34047 Vulnerability in maven package org.springframework.graphql:spring-graphql
CVE-2021-21695 Vulnerability in maven package org.jenkins-ci.main:jenkins-core