Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m26f-w3h5-62fj

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 4.2

Описание

Sandbox bypass vulnerability in Jenkins Script Security Plugin

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.

Пакеты

Наименование

org.jenkins-ci.plugins:script-security

maven
Затронутые версииВерсия исправления

<= 1.62

1.63

EPSS

Процентиль: 44%
0.00221
Низкий

4.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.2
redhat
больше 6 лет назад

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 4.2
nvd
больше 6 лет назад

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.

EPSS

Процентиль: 44%
0.00221
Низкий

4.2 Medium

CVSS3