Описание
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.
Ссылки
- Mailing ListThird Party Advisory
- Vendor Advisory
- Mailing ListThird Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.64 (включая)
cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 56%
0.00342
Низкий
9.9 Critical
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-94
Связанные уязвимости
CVSS3: 8.8
redhat
больше 6 лет назад
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.
CVSS3: 9.9
github
больше 3 лет назад
Improper Control of Generation of Code in Jenkins Script Security Plugin
EPSS
Процентиль: 56%
0.00342
Низкий
9.9 Critical
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-94