Home » Database

AVID-2026-R0938

Description

Vulnerability CVE-2022-20617

Details

Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job’s SCM repository.

Reason for inclusion in AVID: CVE-2022-20617 describes an OS command execution vulnerability in the Jenkins Docker Commons Plugin due to unsanitized image/tag names. This plugin is commonly used in CI/CD pipelines for building/deploying containerized artifacts, including those used in AI/ML workflows. As such, it is a software supply chain issue affecting components used to build, package, deploy, or run AI systems (CI/CD, artifact pipelines), and it represents a security vulnerability with potential remote code execution. The evidence in the report supports all required aspects.

References

Affected or Relevant Artifacts

  • Developer: Jenkins project
  • Deployer: Jenkins project
  • Artifact Details:
TypeName
SystemJenkins Docker Commons Plugin

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2022-01-12
  • Version: 0.3.3
  • AVID Entry