Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6q78-6xvr-26fg

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

Jenkins Groovy Plugin sandbox bypass vulnerability

Jenkins Script Security sandbox protection could be circumvented during the script compilation phase by applying AST transforming annotations such as @Grab to source code elements.

Both the pipeline validation REST APIs and actual script/pipeline execution are affected.

This allowed users with Overall/Read permission, or able to control Jenkinsfile or sandboxed Pipeline shared library contents in SCM, to bypass the sandbox protection and execute arbitrary code on the Jenkins controller.

All known unsafe AST transformations in Groovy are now prohibited in sandboxed scripts.

Пакеты

Наименование

org.jenkins-ci.plugins.workflow:workflow-cps-parent

maven
Затронутые версииВерсия исправления

<= 2.61

2.61.1

Наименование

org.jenkins-ci.plugins:pipeline-model-definition

maven
Затронутые версииВерсия исправления

<= 1.3.4

1.3.4.1

Наименование

org.jenkins-ci.plugins:script-security

maven
Затронутые версииВерсия исправления

<= 1.49

1.50

EPSS

Процентиль: 100%
0.93935
Критический

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
redhat
около 7 лет назад

A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

CVSS3: 8.8
nvd
около 7 лет назад

A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

EPSS

Процентиль: 100%
0.93935
Критический

8.8 High

CVSS3