OS command injection vulnerability in Jenkins Play Framework Plugin
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Jan 29, 2023
Package
Affected versions
<= 1.0.2
Patched versions
None
Description
Published by the National Vulnerability Database
Jun 3, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 21, 2022
Last updated
Jan 29, 2023
A form validation endpoint in Play Framework Plugin executes the
play
command to validate a given input file.Play Framework Plugin 1.0.2 and earlier lets users specify the path to the
play
command on the Jenkins controller. This results in an OS command injection vulnerability exploitable by users able to store such a file on the Jenkins controller (e.g. through archiving artifacts).References