Описание
A sandbox bypass vulnerability exists in Jenkins Email Extension Plugin 2.64 and earlier in pom.xml, src/main/java/hudson/plugins/emailext/ExtendedEmailPublisher.java, src/main/java/hudson/plugins/emailext/plugins/content/EmailExtScript.java, src/main/java/hudson/plugins/emailext/plugins/content/ScriptContent.java, src/main/java/hudson/plugins/emailext/plugins/trigger/AbstractScriptTrigger.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM.
Ссылки
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.64 (включая)
cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 26%
0.00093
Низкий
9.9 Critical
CVSS3
6.5 Medium
CVSS2
Дефекты
NVD-CWE-noinfo
Связанные уязвимости
CVSS3: 9.9
github
больше 3 лет назад
Script security sandbox bypass in Jenkins Email Extension Plugin
EPSS
Процентиль: 26%
0.00093
Низкий
9.9 Critical
CVSS3
6.5 Medium
CVSS2
Дефекты
NVD-CWE-noinfo