Логотип exploitDog
bind:CVE-2017-1000095
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-1000095

Количество 3

Количество 3

redhat логотип

CVE-2017-1000095

больше 8 лет назад

The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['rawBuild'] rather than currentBuild.rawBuild. Additionally, the following entries allowed accessing private data that would not be accessible otherwise due to script security: groovy.json.JsonOutput.toJson(Closure); groovy.json.JsonOutput.toJson(Object).

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2017-1000095

больше 8 лет назад

The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['rawBuild'] rather than currentBuild.rawBuild. Additionally, the following entries allowed accessing private data that would not be accessible otherwise due to script security: groovy.json.JsonOutput.toJson(Closure); groovy.json.JsonOutput.toJson(Object).

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-m68x-cc2f-gr5h

больше 3 лет назад

Unsafe methods in the default list of approved signatures in Jenkins Script Security Plugin

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2017-1000095

The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['rawBuild'] rather than currentBuild.rawBuild. Additionally, the following entries allowed accessing private data that would not be accessible otherwise due to script security: groovy.json.JsonOutput.toJson(Closure); groovy.json.JsonOutput.toJson(Object).

CVSS3: 8.8
0%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-1000095

The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['rawBuild'] rather than currentBuild.rawBuild. Additionally, the following entries allowed accessing private data that would not be accessible otherwise due to script security: groovy.json.JsonOutput.toJson(Closure); groovy.json.JsonOutput.toJson(Object).

CVSS3: 6.5
0%
Низкий
больше 8 лет назад
github логотип
GHSA-m68x-cc2f-gr5h

Unsafe methods in the default list of approved signatures in Jenkins Script Security Plugin

CVSS3: 6.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу