Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h7rx-r733-7x7r

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

Sandbox bypass in Jenkins Script Security Plugin sandbox bypass

Script Security Plugin did not apply sandboxing restrictions to constructor invocations via positional arguments list, super constructor invocations, method references, and type coercion expressions. This could be used to invoke arbitrary constructors and methods, bypassing sandbox protection.

Пакеты

Наименование

org.jenkins-ci.plugins:script-security

maven
Затронутые версииВерсия исправления

<= 1.30

1.31

EPSS

Процентиль: 50%
0.00274
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
redhat
больше 8 лет назад

Script Security Plugin did not apply sandboxing restrictions to constructor invocations via positional arguments list, super constructor invocations, method references, and type coercion expressions. This could be used to invoke arbitrary constructors and methods, bypassing sandbox protection.

CVSS3: 8.8
nvd
больше 8 лет назад

Script Security Plugin did not apply sandboxing restrictions to constructor invocations via positional arguments list, super constructor invocations, method references, and type coercion expressions. This could be used to invoke arbitrary constructors and methods, bypassing sandbox protection.

EPSS

Процентиль: 50%
0.00274
Низкий

8.8 High

CVSS3