Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-30945

Опубликовано: 17 мая 2022
Источник: redhat
CVSS3: 8.5
EPSS Низкий

Описание

Jenkins Pipeline: Groovy Plugin 2689.v434009a_31b_f1 and earlier allows loading any Groovy source files on the classpath of Jenkins and Jenkins plugins in sandboxed pipelines.

A flaw was found in Jenkins Groovy Plugin. The plugin allows pipelines to load Groovy source files. The intent is to allow Global Shared Libraries to execute without sandbox protection. The issue is that the plugin allows any Groovy source files bundled with Jenkins core and plugins to be loaded this way and their methods executed. If a suitable Groovy source file is available on the classpath of Jenkins, sandbox protections can be bypassed. No Groovy source files were found in Jenkins core or plugins that could result in attackers executing dangerous code; hence successful exploitation is considered highly unlikely.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsWill not fix
Red Hat OpenShift Container Platform 4.8jenkins-2-pluginsFixedRHSA-2023:001712.01.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-552->CWE-693
https://bugzilla.redhat.com/show_bug.cgi?id=2119642plugin: Sandbox bypass vulnerability through implicitly allowlisted platform Groovy files in Pipeline: Groovy Plugin

EPSS

Процентиль: 82%
0.01701
Низкий

8.5 High

CVSS3

Связанные уязвимости

CVSS3: 8.5
nvd
больше 3 лет назад

Jenkins Pipeline: Groovy Plugin 2689.v434009a_31b_f1 and earlier allows loading any Groovy source files on the classpath of Jenkins and Jenkins plugins in sandboxed pipelines.

CVSS3: 7.5
github
больше 3 лет назад

Sandbox bypass vulnerability through implicitly allowlisted platform Groovy files in Jenkins Pipeline: Groovy Plugin

EPSS

Процентиль: 82%
0.01701
Низкий

8.5 High

CVSS3