Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qwm8-vgm6-f86p

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 9.9

Описание

Script security sandbox bypass in Jenkins Email Extension Plugin

A sandbox bypass vulnerability exists in Jenkins Email Extension Plugin 2.64 and earlier in pom.xml, src/main/java/hudson/plugins/emailext/ExtendedEmailPublisher.java, src/main/java/hudson/plugins/emailext/plugins/content/EmailExtScript.java, src/main/java/hudson/plugins/emailext/plugins/content/ScriptContent.java, src/main/java/hudson/plugins/emailext/plugins/trigger/AbstractScriptTrigger.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM.

Пакеты

Наименование

org.jenkins-ci.plugins:email-ext

maven
Затронутые версииВерсия исправления

< 2.65

2.65

EPSS

Процентиль: 26%
0.00093
Низкий

9.9 Critical

CVSS3

Дефекты

CWE-693

Связанные уязвимости

CVSS3: 9.9
nvd
почти 7 лет назад

A sandbox bypass vulnerability exists in Jenkins Email Extension Plugin 2.64 and earlier in pom.xml, src/main/java/hudson/plugins/emailext/ExtendedEmailPublisher.java, src/main/java/hudson/plugins/emailext/plugins/content/EmailExtScript.java, src/main/java/hudson/plugins/emailext/plugins/content/ScriptContent.java, src/main/java/hudson/plugins/emailext/plugins/trigger/AbstractScriptTrigger.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM.

EPSS

Процентиль: 26%
0.00093
Низкий

9.9 Critical

CVSS3

Дефекты

CWE-693