Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-njg6-m67f-bfb9
Summary
Path traversal in Jenkins Git Mercurial and Repo Plugins
Jenkins SCMs support a number of different URL schemes, including local file system paths (e.g. using `file:` URLs).

Historically in Jenkins, only agents checked out from SCM, and if multiple projects share the same agent, there is no expected isolation between builds besides using different workspaces unless overridden. Some Pipeline-related features check out SCMs from the Jenkins controller as well.

This allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller’s file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
Aliases
0
alias CVE-2022-30947
1
alias GHSA-84cm-vjwm-m979
Fixed_packages
0
url pkg:maven/org.jenkins-ci.plugins/git@4.11.2
purl pkg:maven/org.jenkins-ci.plugins/git@4.11.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.2
1
url pkg:maven/org.jenkins-ci.plugins/mercurial@2.16.1
purl pkg:maven/org.jenkins-ci.plugins/mercurial@2.16.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/mercurial@2.16.1
2
url pkg:maven/org.jenkins-ci.plugins/repo@1.15.0
purl pkg:maven/org.jenkins-ci.plugins/repo@1.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/repo@1.15.0
Affected_packages
0
url pkg:maven/org.jenkins-ci.plugins/git@4.11.1
purl pkg:maven/org.jenkins-ci.plugins/git@4.11.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a88b-qg5x-2kdu
1
vulnerability VCID-c2jh-gx5w-mqcd
2
vulnerability VCID-njg6-m67f-bfb9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.1
1
url pkg:maven/org.jenkins-ci.plugins/mercurial@2.16
purl pkg:maven/org.jenkins-ci.plugins/mercurial@2.16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a88b-qg5x-2kdu
1
vulnerability VCID-c2jh-gx5w-mqcd
2
vulnerability VCID-njg6-m67f-bfb9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/mercurial@2.16
2
url pkg:maven/org.jenkins-ci.plugins/repo@1.14.0
purl pkg:maven/org.jenkins-ci.plugins/repo@1.14.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-njg6-m67f-bfb9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/repo@1.14.0
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30947
reference_id
reference_type
scores
0
value 0.0116
scoring_system epss
scoring_elements 0.78664
published_at 2026-04-29T12:55:00Z
1
value 0.0116
scoring_system epss
scoring_elements 0.78542
published_at 2026-04-02T12:55:00Z
2
value 0.0116
scoring_system epss
scoring_elements 0.78572
published_at 2026-04-04T12:55:00Z
3
value 0.0116
scoring_system epss
scoring_elements 0.78555
published_at 2026-04-07T12:55:00Z
4
value 0.0116
scoring_system epss
scoring_elements 0.78581
published_at 2026-04-08T12:55:00Z
5
value 0.0116
scoring_system epss
scoring_elements 0.78587
published_at 2026-04-09T12:55:00Z
6
value 0.0116
scoring_system epss
scoring_elements 0.78611
published_at 2026-04-11T12:55:00Z
7
value 0.0116
scoring_system epss
scoring_elements 0.78593
published_at 2026-04-12T12:55:00Z
8
value 0.0116
scoring_system epss
scoring_elements 0.78585
published_at 2026-04-13T12:55:00Z
9
value 0.0116
scoring_system epss
scoring_elements 0.78613
published_at 2026-04-16T12:55:00Z
10
value 0.0116
scoring_system epss
scoring_elements 0.78612
published_at 2026-04-18T12:55:00Z
11
value 0.0116
scoring_system epss
scoring_elements 0.78608
published_at 2026-04-21T12:55:00Z
12
value 0.0116
scoring_system epss
scoring_elements 0.7864
published_at 2026-04-24T12:55:00Z
13
value 0.0116
scoring_system epss
scoring_elements 0.78647
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30947
1
reference_url https://github.com/jenkinsci/git-plugin
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin
2
reference_url https://github.com/jenkinsci/git-plugin/commit/b295606e0b865c298fde27bea14f9b7535a976e6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin/commit/b295606e0b865c298fde27bea14f9b7535a976e6
3
reference_url https://github.com/jenkinsci/mercurial-plugin/commit/55904fbb8c9d3e0b36fc26330374904cb68e8758
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/mercurial-plugin/commit/55904fbb8c9d3e0b36fc26330374904cb68e8758
4
reference_url https://github.com/jenkinsci/repo-plugin/commit/3c8e6236b1088fc138a1a3e6af5ebbcb8b616f2f
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/repo-plugin/commit/3c8e6236b1088fc138a1a3e6af5ebbcb8b616f2f
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30947
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30947
6
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
7
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
8
reference_url https://github.com/advisories/GHSA-84cm-vjwm-m979
reference_id GHSA-84cm-vjwm-m979
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-84cm-vjwm-m979
Weaknesses
0
cwe_id 22
name Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
description The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
1
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-njg6-m67f-bfb9