CVE-2022-30948

Source
https://cve.org/CVERecord?id=CVE-2022-30948
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-30948.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-30948
Aliases
Downstream
Published
2022-05-17T15:15:08.853Z
Modified
2025-11-14T13:16:59.642295Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Jenkins Mercurial Plugin 2.16 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.

References

Affected packages

Git / github.com/jenkinsci/mercurial-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/mercurial-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

mercurial-1.*

mercurial-1.35
mercurial-1.36
mercurial-1.37
mercurial-1.38
mercurial-1.39
mercurial-1.40
mercurial-1.41
mercurial-1.42
mercurial-1.43
mercurial-1.44
mercurial-1.45
mercurial-1.46
mercurial-1.47
mercurial-1.48
mercurial-1.48-beta-1
mercurial-1.49
mercurial-1.50
mercurial-1.50-beta-1
mercurial-1.50-beta-2
mercurial-1.51
mercurial-1.51-beta-1
mercurial-1.51-beta-2
mercurial-1.51-beta-3
mercurial-1.52
mercurial-1.53
mercurial-1.54
mercurial-1.55
mercurial-1.56
mercurial-1.57
mercurial-1.58
mercurial-1.58-beta-1
mercurial-1.59
mercurial-1.60
mercurial-1.61

mercurial-2.*

mercurial-2.0
mercurial-2.0-alpha-1
mercurial-2.0-alpha-4
mercurial-2.0-beta-1
mercurial-2.1
mercurial-2.10
mercurial-2.11
mercurial-2.12
mercurial-2.13
mercurial-2.14
mercurial-2.15
mercurial-2.16
mercurial-2.2
mercurial-2.3
mercurial-2.4
mercurial-2.5
mercurial-2.6
mercurial-2.7
mercurial-2.8
mercurial-2.9

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-30948.json"