
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-25184 is a security vulnerability discovered in Jenkins Pipeline: Build Step Plugin versions 2.15 and earlier. The vulnerability was disclosed on February 15, 2022, affecting the plugin's pipeline script generation functionality through the Pipeline Snippet Generator. This vulnerability impacts Jenkins installations using the affected versions of the Pipeline: Build Step Plugin (Jenkins Advisory).
The vulnerability has a CVSS severity rating of Medium. The core issue lies in the Pipeline: Build Step Plugin's handling of password parameters when generating pipeline scripts. When using the Pipeline Snippet Generator, the plugin reveals password parameter default values, which should remain confidential (Jenkins Advisory).
The vulnerability allows attackers with Item/Read permission to retrieve the default password parameter values from Jenkins jobs. This exposure of sensitive credentials could potentially lead to unauthorized access to systems or services configured with these default passwords (Jenkins Advisory).
The vulnerability has been fixed in Pipeline: Build Step Plugin version 2.15.1. The updated version redacts password parameters in the generated pipeline script. Users are advised to upgrade to this version to protect against the vulnerability (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."