Loading HuntDB...

GHSA-84cm-vjwm-m979

GitHub Security Advisory

Path traversal in Jenkins Git Mercurial and Repo Plugins

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Jenkins SCMs support a number of different URL schemes, including local file system paths (e.g. using `file:` URLs).

Historically in Jenkins, only agents checked out from SCM, and if multiple projects share the same agent, there is no expected isolation between builds besides using different workspaces unless overridden. Some Pipeline-related features check out SCMs from the Jenkins controller as well.

This allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller’s file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.

Affected Packages

Maven org.jenkins-ci.plugins:git
Affected versions: 0 (fixed in 4.11.2)
Maven org.jenkins-ci.plugins:mercurial
Affected versions: 0 (fixed in 2.16.1)
Maven org.jenkins-ci.plugins:repo
Affected versions: 0 (fixed in 1.15.0)

Related CVEs

Key Information

GHSA ID
GHSA-84cm-vjwm-m979
Published
May 18, 2022 12:00 AM
Last Modified
December 6, 2023 3:20 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:git
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 6, 2025 6:30 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.