Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-c2jh-gx5w-mqcd
Summary
Path traversal in Jenkins Mercurial Plugin
SCMs support a number of different URL schemes, including local file system paths (e.g. using file: URLs).

Historically in Jenkins, only agents checked out from SCM, and if multiple projects share the same agent, there is no expected isolation between builds besides using different workspaces unless overridden. Some Pipeline-related features check out SCMs from the Jenkins controller as well.

This allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller’s file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents
Aliases
0
alias CVE-2022-30948
1
alias GHSA-5786-3qjg-mr88
Fixed_packages
0
url pkg:maven/org.jenkins-ci.plugins/mercurial@2.16.1
purl pkg:maven/org.jenkins-ci.plugins/mercurial@2.16.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/mercurial@2.16.1
Affected_packages
0
url pkg:maven/org.jenkins-ci.plugins/git@4.11.1
purl pkg:maven/org.jenkins-ci.plugins/git@4.11.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a88b-qg5x-2kdu
1
vulnerability VCID-c2jh-gx5w-mqcd
2
vulnerability VCID-njg6-m67f-bfb9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.1
1
url pkg:maven/org.jenkins-ci.plugins/mercurial@2.16
purl pkg:maven/org.jenkins-ci.plugins/mercurial@2.16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a88b-qg5x-2kdu
1
vulnerability VCID-c2jh-gx5w-mqcd
2
vulnerability VCID-njg6-m67f-bfb9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/mercurial@2.16
2
url pkg:rpm/redhat/jenkins-2-plugins@4.8.1672842762-1?arch=el8
purl pkg:rpm/redhat/jenkins-2-plugins@4.8.1672842762-1?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4qvq-xv22-xbed
1
vulnerability VCID-7ez2-n617-u3dq
2
vulnerability VCID-9h4k-xjx5-afc8
3
vulnerability VCID-c2jh-gx5w-mqcd
4
vulnerability VCID-ca7m-fb38-kfe2
5
vulnerability VCID-fzvq-dpvh-v7eu
6
vulnerability VCID-gxu6-51zm-sfh7
7
vulnerability VCID-hg91-mnh3-g3a4
8
vulnerability VCID-k6wy-rwhv-ckd2
9
vulnerability VCID-qsut-4d83-97h1
10
vulnerability VCID-rs56-6qvx-vucg
11
vulnerability VCID-tt48-pfzv-mkgt
12
vulnerability VCID-ubq1-gzr6-x3fu
13
vulnerability VCID-xq5k-dyk9-u3ct
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.8.1672842762-1%3Farch=el8
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30948.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30948.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30948
reference_id
reference_type
scores
0
value 0.00737
scoring_system epss
scoring_elements 0.72972
published_at 2026-05-09T12:55:00Z
1
value 0.00737
scoring_system epss
scoring_elements 0.72947
published_at 2026-05-07T12:55:00Z
2
value 0.00737
scoring_system epss
scoring_elements 0.72921
published_at 2026-05-05T12:55:00Z
3
value 0.01803
scoring_system epss
scoring_elements 0.82762
published_at 2026-04-07T12:55:00Z
4
value 0.01803
scoring_system epss
scoring_elements 0.82788
published_at 2026-04-08T12:55:00Z
5
value 0.01803
scoring_system epss
scoring_elements 0.82794
published_at 2026-04-09T12:55:00Z
6
value 0.01803
scoring_system epss
scoring_elements 0.8281
published_at 2026-04-11T12:55:00Z
7
value 0.01803
scoring_system epss
scoring_elements 0.82806
published_at 2026-04-12T12:55:00Z
8
value 0.01803
scoring_system epss
scoring_elements 0.82801
published_at 2026-04-13T12:55:00Z
9
value 0.01803
scoring_system epss
scoring_elements 0.8284
published_at 2026-04-16T12:55:00Z
10
value 0.01803
scoring_system epss
scoring_elements 0.82839
published_at 2026-04-18T12:55:00Z
11
value 0.01803
scoring_system epss
scoring_elements 0.82842
published_at 2026-04-21T12:55:00Z
12
value 0.01803
scoring_system epss
scoring_elements 0.82864
published_at 2026-04-24T12:55:00Z
13
value 0.01803
scoring_system epss
scoring_elements 0.82873
published_at 2026-04-26T12:55:00Z
14
value 0.01803
scoring_system epss
scoring_elements 0.82878
published_at 2026-04-29T12:55:00Z
15
value 0.02427
scoring_system epss
scoring_elements 0.85088
published_at 2026-04-02T12:55:00Z
16
value 0.02427
scoring_system epss
scoring_elements 0.85105
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30948
2
reference_url https://github.com/jenkinsci/mercurial-plugin
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/mercurial-plugin
3
reference_url https://github.com/jenkinsci/mercurial-plugin/commit/b995436e560b01818f5d9e9920990370cc575341
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/mercurial-plugin/commit/b995436e560b01818f5d9e9920990370cc575341
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30948
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30948
5
reference_url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
6
reference_url http://www.openwall.com/lists/oss-security/2022/05/17/8
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/05/17/8
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119644
reference_id 2119644
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119644
8
reference_url https://github.com/advisories/GHSA-5786-3qjg-mr88
reference_id GHSA-5786-3qjg-mr88
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5786-3qjg-mr88
9
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
Weaknesses
0
cwe_id 22
name Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
description The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
1
cwe_id 435
name Improper Interaction Between Multiple Correctly-Behaving Entities
description An interaction error occurs when two entities have correct behavior when running independently of each other, but when they are integrated as components in a larger system or process, they introduce incorrect behaviors that may cause resultant weaknesses.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
3
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score0.1 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-c2jh-gx5w-mqcd