
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-23118 is a high-severity security vulnerability affecting the Jenkins Debian Package Builder Plugin versions 1.6.11 and earlier. The vulnerability was discovered by Daniel Beck from CloudBees, Inc. and was publicly disclosed on January 12, 2022. This vulnerability affects the Jenkins automation server's plugin that handles Debian package building functionality (Jenkins Advisory).
The vulnerability stems from a functionality implementation that allows agent processes to invoke command-line git at an attacker-specified path on the Jenkins controller. This agent-to-controller security bypass vulnerability has been assigned a High severity CVSS rating (Jenkins Advisory).
The vulnerability enables attackers who have control over agent processes to execute arbitrary OS commands on the Jenkins controller. This represents a significant security risk as it could lead to complete system compromise through unauthorized command execution (Jenkins Advisory).
As of the advisory publication date on January 12, 2022, no fix was available for this vulnerability in the Debian Package Builder Plugin. Users running affected versions (1.6.11 and earlier) should assess their risk and consider implementing additional security controls to restrict agent access and monitor command execution (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."