Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-28677

EPSS 2.14% · P84
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-28677

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Jenkins Convert To Pipeline Plugin 1.0 and earlier uses basic string concatenation to convert Freestyle projects' Build Environment, Build Steps, and Post-build Actions to the equivalent Pipeline step invocations, allowing attackers able to configure Freestyle projects to prepare a crafted configuration that injects Pipeline script code into the (unsandboxed) Pipeline resulting from a convertion by Jenkins Convert To Pipeline Plugin.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Jenkins Plugins Convert To Pipeline 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Jenkins和Jenkins Plugin都是Jenkins开源的产品。Jenkins是一个应用软件。一个开源自动化服务器Jenkins提供了数百个插件来支持构建,部署和自动化任何项目。Jenkins Plugin是一个应用软件。 Jenkins Plugins Convert To Pipeline 1.0及之前版本存在安全漏洞,该漏洞源于存在命令注入漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Jenkins ProjectJenkins Convert To Pipeline Plugin 0 ~ 1.0 -

II. Public POCs for CVE-2023-28677

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-28677

登录查看更多情报信息。

Same Patch Batch · Jenkins Project · 2023-03-23 · 17 CVEs total

CVE-2023-28668Jenkins Plugins Role-based Authorization Strategy 安全漏洞
CVE-2023-28669Jenkins Plugins JaCoCo 跨站脚本漏洞
CVE-2023-28670Jenkins Plugins Pipeline Aggregator View 跨站脚本漏洞
CVE-2023-28671Jenkins Plugins OctoPerf Load Testing 跨站请求伪造漏洞
CVE-2023-28672Jenkins Plugins OctoPerf Load Testing 安全漏洞
CVE-2023-28673Jenkins Plugins OctoPerf Load Testing 安全漏洞
CVE-2023-28674Jenkins Plugins OctoPerf Load Testing 跨站请求伪造漏洞
CVE-2023-28675Jenkins Plugins OctoPerf Load Testing 安全漏洞
CVE-2023-28676Jenkins Plugins Convert To Pipeline 跨站请求伪造漏洞
CVE-2023-28678Jenkins Plugins Cppcheck 跨站脚本漏洞
CVE-2023-28679Jenkins Plugins Mashup Portlet 跨站脚本漏洞
CVE-2023-28680Jenkins Plugins Crap4J 代码问题漏洞
CVE-2023-28681Jenkins Plugins Visual Studio Code Metrics 代码问题漏洞
CVE-2023-28682Jenkins Plugins Performance Publisher 代码问题漏洞
CVE-2023-28683Jenkins Plugins Phabricator Differential 代码问题漏洞
CVE-2023-28684Jenkins Plugins remote-jobs-view-plugin 代码问题漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2023-28677

No comments yet


Leave a comment