Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-1000505

Опубликовано: 25 янв. 2018
Источник: nvd
CVSS3: 6.5
CVSS2: 4
EPSS Низкий

Описание

In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new File objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the new File(String) constructor for the purpose of in-process script approval.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*
Версия до 1.36 (включая)

EPSS

Процентиль: 54%
0.00316
Низкий

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 6.5
redhat
около 8 лет назад

In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.

CVSS3: 6.5
github
больше 3 лет назад

Exposure of Sensitive Information to an Unauthorized Actor Jenkins Script Security Plugin

EPSS

Процентиль: 54%
0.00316
Низкий

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-200