{"api_version":"1","generated_at":"2026-04-23T01:32:55+00:00","cve":"CVE-2022-30948","urls":{"html":"https://cve.report/CVE-2022-30948","api":"https://cve.report/api/cve/CVE-2022-30948.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-30948","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-30948"},"summary":{"title":"CVE-2022-30948","description":"Jenkins Mercurial Plugin 2.16 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.","state":"PUBLIC","assigner":"jenkinsci-cert@googlegroups.com","published_at":"2022-05-17 15:15:00","updated_at":"2023-11-03 18:19:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"http://www.openwall.com/lists/oss-security/2022/05/17/8","name":"[oss-security] 20220517 Multiple vulnerabilities in Jenkins plugins","refsource":"MLIST","tags":[],"title":"oss-security - Multiple vulnerabilities in Jenkins plugins","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478","name":"https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478","refsource":"CONFIRM","tags":[],"title":"Jenkins Security Advisory 2022-05-17","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-30948","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30948","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"30948","vulnerable":"1","versionEndIncluding":"4.11.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jenkins","cpe5":"git","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"jenkins","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"30948","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jenkins","cpe5":"mercurial","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"jenkins","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"30948","vulnerable":"1","versionEndIncluding":"2.16","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jenkins","cpe5":"mercurial","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"jenkins","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"30948","vulnerable":"1","versionEndIncluding":"1.14.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jenkins","cpe5":"repo","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"jenkins","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-30948","qid":"241063","title":"Red Hat OpenShift Container Platform 4.8 Security Update (RHSA-2023:0017)"},{"cve":"CVE-2022-30948","qid":"770171","title":"Red Hat OpenShift Container Platform 4.8. Security Update (RHSA-2023:0017)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-30948","ASSIGNER":"jenkinsci-cert@googlegroups.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Jenkins Mercurial Plugin 2.16 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Jenkins project","product":{"product_data":[{"product_name":"Jenkins Mercurial Plugin","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"lessThanOrEqual":"2.16","status":"affected","version":"unspecified","versionType":"custom"},{"status":"unaffected","version":"2.15.1"}]}}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478","refsource":"MISC","name":"https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478"},{"url":"http://www.openwall.com/lists/oss-security/2022/05/17/8","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2022/05/17/8"}]}},"nvd":{"publishedDate":"2022-05-17 15:15:00","lastModifiedDate":"2023-11-03 18:19:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jenkins:mercurial:*:*:*:*:*:jenkins:*:*","versionEndExcluding":"2.16.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}