Loading HuntDB...

GHSA-7c44-m589-36w7

GitHub Security Advisory

Jenkins Convert To Pipeline Plugin vulnerable to command injection

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Jenkins Convert To Pipeline Plugin 1.0 and earlier uses basic string concatenation to convert Freestyle projects' Build Environment, Build Steps, and Post-build Actions to the equivalent Pipeline step invocations.

This allows attackers able to configure Freestyle projects to prepare a crafted configuration that injects Pipeline script code into the (unsandboxed) Pipeline resulting from a conversion by Convert To Pipeline Plugin. If an administrator converts the Freestyle project to a Pipeline, the script will be pre-approved.

Affected Packages

Maven org.jenkins-ci.plugins:convert-to-pipeline
Affected versions: 0 (last affected: 1.0)

Related CVEs

Key Information

GHSA ID
GHSA-7c44-m589-36w7
Published
April 2, 2023 9:30 PM
Last Modified
February 25, 2025 9:45 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:convert-to-pipeline
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 25, 2025 6:33 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.