Loading HuntDB...

GHSA-6987-xccv-fhjp

GitHub Security Advisory

Jenkins Pipeline Utility Steps Plugin arbitrary file write vulnerability

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins Pipeline Utility Steps Plugin provides the `untar` and `unzip` Pipeline steps to extract archives into job workspaces.

Pipeline Utility Steps Plugin 2.15.2 and earlier does not validate or limit file paths of files contained within these archives.

This allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.

Pipeline Utility Steps Plugin 2.15.3 rejects extraction of files in `tar` and `zip` archives that would be placed outside the expected destination directory.

Affected Packages

Maven org.jenkins-ci.plugins:pipeline-utility-steps
Affected versions: 0 (fixed in 2.15.3)

Related CVEs

Key Information

GHSA ID
GHSA-6987-xccv-fhjp
Published
May 16, 2023 6:30 PM
Last Modified
May 17, 2023 2:59 AM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:pipeline-utility-steps
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.