Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f6mq-6fx5-w2ch

Опубликовано: 19 окт. 2022
Источник: github
Github: Прошло ревью
CVSS3: 9.9

Описание

Jenkins Script Security Plugin sandbox bypass vulnerability

A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. Script Security Plugin 1184.v85d16b_d851b_3 intercepts per-element casts when casting array-like values to array types.

Пакеты

Наименование

org.jenkins-ci.plugins:script-security

maven
Затронутые версииВерсия исправления

< 1184.v85d16b

1184.v85d16b_d851b_3

EPSS

Процентиль: 47%
0.00242
Низкий

9.9 Critical

CVSS3

Дефекты

CWE-693

Связанные уязвимости

CVSS3: 9.9
redhat
больше 3 лет назад

A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

CVSS3: 9.9
nvd
больше 3 лет назад

A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

EPSS

Процентиль: 47%
0.00242
Низкий

9.9 Critical

CVSS3

Дефекты

CWE-693