Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency org.jenkins-ci.plugins:pipeline-utility-steps to v2 [security] #5023

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Aug 27, 2024

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
org.jenkins-ci.plugins:pipeline-utility-steps 1.3.0 -> 2.15.3 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2022-45381

Pipeline Utility Steps Plugin implements a readProperties Pipeline step that supports interpolation of variables using the Apache Commons Configuration library.

Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of this library that enable the file: prefix interpolator by default.

This allows attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.

Pipeline Utility Steps Plugin 2.13.2 restricts the set of prefix interpolators enabled by default to base64Decoder:, base64Encoder:, date:, urlDecoder:, and urlEncoder:.

Administrators can set the Java system property org.jenkinsci.plugins.pipeline.utility.steps.conf.ReadPropertiesStepExecution.CUSTOM_PREFIX_INTERPOLATOR_LOOKUPS to customize which prefix interpolators are enabled.

CVE-2023-32981

Jenkins Pipeline Utility Steps Plugin provides the untar and unzip Pipeline steps to extract archives into job workspaces.

Pipeline Utility Steps Plugin 2.15.2 and earlier does not validate or limit file paths of files contained within these archives.

This allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.

Pipeline Utility Steps Plugin 2.15.3 rejects extraction of files in tar and zip archives that would be placed outside the expected destination directory.


Release Notes

jenkinsci/pipeline-utility-steps-plugin (org.jenkins-ci.plugins:pipeline-utility-steps)

v2.3.1

Enabled release Drafter.

v2.3.0

v2.2.0

Minor bumped because bump of Jenkins core dependency.

  • Include defaults in interpolation (PR #​50)
  • Updated maven-model version to workaround MNG-6204 (PR #​48)
  • Just dev things
    • Dollar-slashy strings are not that safe (PR #​52)
    • [JEP-210] Verifying that the tee step works correctly with remote durable task output (PR #​51)

v2.1.0

  • Fixed JENKINS-50633 requirering core bump to 2.73.2
  • Added explicit charset encoding when reading json to match writing json

v2.0.2

v2.0.1

  • Fixed the Snippetizer for tee step. (PR #​43)

v2.0

Minor bumped because bump of Jenkins core dependency.

  • Include defaults in interpolation (PR #​50)
  • Updated maven-model version to workaround MNG-6204 (PR #​48)
  • Just dev things
    • Dollar-slashy strings are not that safe (PR #​52)
    • [JEP-210] Verifying that the tee step works correctly with remote durable task output (PR #​51)

v1.5.1

v1.5.0

v1.4.1

  • Made the readXx methods not require a workspace if only the text parameter is used (PR #​31).

v1.4.0


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from a team as a code owner August 27, 2024 09:33
@renovate renovate bot force-pushed the renovate/maven-org.jenkins-ci.plugins-pipeline-utility-steps-vulnerability branch 3 times, most recently from 44ea2c9 to d756843 Compare August 30, 2024 12:48
@renovate renovate bot force-pushed the renovate/maven-org.jenkins-ci.plugins-pipeline-utility-steps-vulnerability branch 7 times, most recently from 67ba457 to 099ab8e Compare September 12, 2024 07:17
@renovate renovate bot force-pushed the renovate/maven-org.jenkins-ci.plugins-pipeline-utility-steps-vulnerability branch 7 times, most recently from 0d577a0 to a88fdf9 Compare September 17, 2024 11:11
@renovate renovate bot force-pushed the renovate/maven-org.jenkins-ci.plugins-pipeline-utility-steps-vulnerability branch 2 times, most recently from 8f33e8c to d533fcd Compare September 26, 2024 07:23
@renovate renovate bot force-pushed the renovate/maven-org.jenkins-ci.plugins-pipeline-utility-steps-vulnerability branch 8 times, most recently from 5150feb to f13deef Compare October 8, 2024 11:00
@renovate renovate bot force-pushed the renovate/maven-org.jenkins-ci.plugins-pipeline-utility-steps-vulnerability branch 2 times, most recently from f74fb98 to 476adb0 Compare October 9, 2024 09:36
@renovate renovate bot force-pushed the renovate/maven-org.jenkins-ci.plugins-pipeline-utility-steps-vulnerability branch 8 times, most recently from 147823d to 9c3d669 Compare October 16, 2024 14:11
@renovate renovate bot force-pushed the renovate/maven-org.jenkins-ci.plugins-pipeline-utility-steps-vulnerability branch 9 times, most recently from 340b026 to 4e50a0e Compare October 24, 2024 09:10
@renovate renovate bot force-pushed the renovate/maven-org.jenkins-ci.plugins-pipeline-utility-steps-vulnerability branch 5 times, most recently from 2dadb76 to cbe38e3 Compare October 30, 2024 11:00
@renovate renovate bot force-pushed the renovate/maven-org.jenkins-ci.plugins-pipeline-utility-steps-vulnerability branch 5 times, most recently from b608168 to 81bd42d Compare November 7, 2024 14:14
@renovate renovate bot force-pushed the renovate/maven-org.jenkins-ci.plugins-pipeline-utility-steps-vulnerability branch from 81bd42d to 1a54b1d Compare November 8, 2024 08:41
Copy link

sonarcloud bot commented Nov 8, 2024

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants