Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-1000095

Опубликовано: 05 окт. 2017
Источник: nvd
CVSS3: 6.5
CVSS2: 4
EPSS Низкий

Описание

The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['rawBuild'] rather than currentBuild.rawBuild. Additionally, the following entries allowed accessing private data that would not be accessible otherwise due to script security: groovy.json.JsonOutput.toJson(Closure); groovy.json.JsonOutput.toJson(Object).

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:jenkins:script_security:1.34:*:*:*:*:jenkins:*:*

EPSS

Процентиль: 21%
0.00066
Низкий

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-732

Связанные уязвимости

CVSS3: 8.8
redhat
больше 8 лет назад

The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['rawBuild'] rather than currentBuild.rawBuild. Additionally, the following entries allowed accessing private data that would not be accessible otherwise due to script security: groovy.json.JsonOutput.toJson(Closure); groovy.json.JsonOutput.toJson(Object).

CVSS3: 6.5
github
больше 3 лет назад

Unsafe methods in the default list of approved signatures in Jenkins Script Security Plugin

EPSS

Процентиль: 21%
0.00066
Низкий

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-732