Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4vjp-327p-w4qv

Опубликовано: 02 апр. 2025
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

Jenkins Templating Engine Plugin Vulnerable to Arbitrary Code Execution

Jenkins Templating Engine Plugin allows defining libraries both in the global configuration, as well as scoped to folders containing the pipelines using them. While libraries in the global configuration can only be set up by administrators and can therefore be trusted, libraries defined in folders can be configured by users with Item/Configure permission.

In Templating Engine Plugin 2.5.3 and earlier, libraries defined in folders are not subject to sandbox protection. This vulnerability allows attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM.

In Templating Engine Plugin 2.5.4, libraries defined in folders are subject to sandbox protection.

Пакеты

Наименование

org.jenkins-ci.plugins:templating-engine

maven
Затронутые версииВерсия исправления

< 2.5.4

2.5.4

EPSS

Процентиль: 75%
0.00856
Низкий

8.8 High

CVSS3

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 8.8
nvd
10 месяцев назад

In Jenkins Templating Engine Plugin 2.5.3 and earlier, libraries defined in folders are not subject to sandbox protection, allowing attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM.

CVSS3: 8.8
fstec
10 месяцев назад

Уязвимость плагина Jenkins Templating Engine (JTE) сервера автоматизации Jenkins, связанная с неверным управлением генерацией кода, позволяющая нарушителю обойти ограничения безопасности и выполнить произвольный код

EPSS

Процентиль: 75%
0.00856
Низкий

8.8 High

CVSS3

Дефекты

CWE-94