{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T09:55:11.679","vulnerabilities":[{"cve":{"id":"CVE-2022-29047","sourceIdentifier":"jenkinsci-cert@googlegroups.com","published":"2022-04-12T20:15:09.613","lastModified":"2024-11-21T06:58:24.233","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Jenkins Pipeline: Shared Groovy Libraries Plugin 564.ve62a_4eb_b_e039 and earlier, except 2.21.3, allows attackers able to submit pull requests (or equivalent), but not able to commit directly to the configured SCM, to effectively change the Pipeline behavior by changing the definition of a dynamically retrieved library in their pull request, even if the Pipeline is configured to not trust them."},{"lang":"es","value":"Jenkins Pipeline: Shared Groovy Libraries Plugin versiones 564.ve62a_4eb_b_e039 y anteriores, excepto 2.21.3, permite a atacantes capaces de enviar pull requests (o equivalentes), pero no capaces de comprometerse directamente con el SCM configurado, cambiar efectivamente el comportamiento de Pipeline cambiando la definición de una biblioteca recuperada dinámicamente en su petición de pull, incluso si Pipeline está configurado para no confiar en ellos"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:pipeline\\:_shared_groovy_libraries:*:*:*:*:*:jenkins:*:*","versionEndExcluding":"2.21.3","matchCriteriaId":"489F2972-DEED-44CD-8015-793619441E0D"},{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:pipeline\\:_shared_groovy_libraries:*:*:*:*:*:jenkins:*:*","versionStartIncluding":"544.vff04fa68714d","versionEndExcluding":"566.vd0a_a_3334a_555","matchCriteriaId":"F2367196-D144-4B31-9047-1F7B2A9865D3"}]}]}],"references":[{"url":"https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-1951","source":"jenkinsci-cert@googlegroups.com","tags":["Vendor Advisory"]},{"url":"https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-1951","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}