GHSA-h5mv-fv98-gqmq

Suggest an improvement
Source
https://github.com/advisories/GHSA-h5mv-fv98-gqmq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-h5mv-fv98-gqmq/GHSA-h5mv-fv98-gqmq.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-h5mv-fv98-gqmq
Aliases
Published
2022-05-24T17:19:05Z
Modified
2023-11-01T04:52:24.410324Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
OS command injection vulnerability in Jenkins Play Framework Plugin
Details

A form validation endpoint in Play Framework Plugin executes the play command to validate a given input file.

Play Framework Plugin 1.0.2 and earlier lets users specify the path to the play command on the Jenkins controller. This results in an OS command injection vulnerability exploitable by users able to store such a file on the Jenkins controller (e.g. through archiving artifacts).

Database specific
{
    "nvd_published_at": "2020-06-03T13:15:00Z",
    "github_reviewed_at": "2022-12-21T16:22:08Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-78"
    ]
}
References

Affected packages

Maven / org.jenkins-ci.plugins:play-autotest-plugin

Package

Name
org.jenkins-ci.plugins:play-autotest-plugin
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/play-autotest-plugin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.0.2