ghsa-r9jf-hf9x-7hrv
Vulnerability from github
Published
2022-05-14 03:45
Modified
2022-07-01 21:43
Severity ?
Summary
Exposure of Sensitive Information to an Unauthorized Actor Jenkins Script Security Plugin
Details
In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new File
objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the new File(String)
constructor for the purpose of in-process script approval.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 1.36" }, "package": { "ecosystem": "Maven", "name": "org.jenkins-ci.plugins:script-security" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.37" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2017-1000505" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": true, "github_reviewed_at": "2022-07-01T21:43:41Z", "nvd_published_at": "2018-01-25T18:29:00Z", "severity": "MODERATE" }, "details": "In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.", "id": "GHSA-r9jf-hf9x-7hrv", "modified": "2022-07-01T21:43:41Z", "published": "2022-05-14T03:45:23Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000505" }, { "type": "WEB", "url": "https://jenkins.io/security/advisory/2017-12-11" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Exposure of Sensitive Information to an Unauthorized Actor Jenkins Script Security Plugin" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.