Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-1000058

Опубликовано: 09 фев. 2018
Источник: nvd
CVSS3: 8.8
CVSS2: 6.5
EPSS Низкий

Описание

Jenkins Pipeline: Supporting APIs Plugin 2.17 and earlier have an arbitrary code execution due to incomplete sandbox protection: Methods related to Java deserialization like readResolve implemented in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:jenkins:pipeline_supporting_apis:*:*:*:*:*:jenkins:*:*
Версия до 2.17 (включая)

EPSS

Процентиль: 79%
0.01296
Низкий

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 7.5
redhat
около 8 лет назад

Jenkins Pipeline: Supporting APIs Plugin 2.17 and earlier have an arbitrary code execution due to incomplete sandbox protection: Methods related to Java deserialization like readResolve implemented in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles.

CVSS3: 8.8
github
больше 3 лет назад

Arbitrary code execution due to incomplete sandbox protection in Pipeline: Supporting APIs Plugin

EPSS

Процентиль: 79%
0.01296
Низкий

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-502