GHSA-6987-xccv-fhjp
GitHub Security Advisory
Jenkins Pipeline Utility Steps Plugin arbitrary file write vulnerability
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
Jenkins Pipeline Utility Steps Plugin provides the `untar` and `unzip` Pipeline steps to extract archives into job workspaces.
Pipeline Utility Steps Plugin 2.15.2 and earlier does not validate or limit file paths of files contained within these archives.
This allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
Pipeline Utility Steps Plugin 2.15.3 rejects extraction of files in `tar` and `zip` archives that would be placed outside the expected destination directory.
Affected Packages
Maven
org.jenkins-ci.plugins:pipeline-utility-steps
Affected versions:
0
(fixed in 2.15.3)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: August 24, 2025 6:28 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.