Link Following in Jenkins Pipeline Multibranch Plugin
        
  Moderate severity
        
          GitHub Reviewed
      
        Published
          Feb 16, 2022 
          to the GitHub Advisory Database
          •
          Updated May 24, 2023 
      
  
Package
Affected versions
>= 2.24, < 2.26.1
      < 2.23.1
      >= 696.v52535c46f4c9, < 696.698.v9b4218eea50f
      >= 706.vd43c65dec013, < 707.v71c3f0a
  Patched versions
2.26.1
      2.23.1
      696.698.v9b4218eea50f
      707.v71c3f0a
  Description
        Published by the National Vulnerability Database
      Feb 15, 2022 
    
  
        Published to the GitHub Advisory Database
      Feb 16, 2022 
    
  
        Reviewed
      Feb 25, 2022 
    
  
        Last updated
      May 24, 2023 
    
  
Jenkins Pipeline: Multibranch Plugin prior to 2.23.1, 2.26.1, 696.698.v9b4218eea50f, and 707.v71c3f0a_6ccdb_ follows symbolic links to locations outside of the checkout directory for the configured SCM when reading files using the readTrusted step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.
References