Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-1000107

Опубликовано: 07 авг. 2017
Источник: redhat
CVSS3: 8.8

Описание

Script Security Plugin did not apply sandboxing restrictions to constructor invocations via positional arguments list, super constructor invocations, method references, and type coercion expressions. This could be used to invoke arbitrary constructors and methods, bypassing sandbox protection.

Отчет

This issue affects the versions of jenkins-plugin-script-security as shipped with Red Hat OpenShift Enterprise. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Enterprise 3jenkins-plugin-script-securityWill not fix
Red Hat OpenShift Enterprise 3jenkins-plugin-workflow-cpsWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-184
https://bugzilla.redhat.com/show_bug.cgi?id=1482091jenkins-plugin-workflow-cps: Multiple Groovy language features allowed Script Security Plugin sandbox bypass

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
больше 8 лет назад

Script Security Plugin did not apply sandboxing restrictions to constructor invocations via positional arguments list, super constructor invocations, method references, and type coercion expressions. This could be used to invoke arbitrary constructors and methods, bypassing sandbox protection.

CVSS3: 8.8
github
больше 3 лет назад

Sandbox bypass in Jenkins Script Security Plugin sandbox bypass

8.8 High

CVSS3