Description
Jenkins Convert To Pipeline Plugin 1.0 and earlier uses basic string concatenation to convert Freestyle projects' Build Environment, Build Steps, and Post-build Actions to the equivalent Pipeline step invocations, allowing attackers able to configure Freestyle projects to prepare a crafted configuration that injects Pipeline script code into the (unsandboxed) Pipeline resulting from a convertion by Jenkins Convert To Pipeline Plugin.
Remediation
References
https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2966
Related Vulnerabilities
CVE-2023-33940 Vulnerability in maven package com.liferay:com.liferay.client.extension.type.impl
CVE-2013-4590 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-jasper
CVE-2022-45401 Vulnerability in maven package org.jenkinsci.plugins:associated-files
CVE-2019-10344 Vulnerability in maven package io.jenkins:configuration-as-code
CVE-2019-16303 Vulnerability in npm package generator-jhipster