Логотип exploitDog
bind:CVE-2017-1000505
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-1000505

Количество 3

Количество 3

redhat логотип

CVE-2017-1000505

около 8 лет назад

In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2017-1000505

около 8 лет назад

In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-r9jf-hf9x-7hrv

больше 3 лет назад

Exposure of Sensitive Information to an Unauthorized Actor Jenkins Script Security Plugin

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2017-1000505

In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.

CVSS3: 6.5
0%
Низкий
около 8 лет назад
nvd логотип
CVE-2017-1000505

In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.

CVSS3: 6.5
0%
Низкий
около 8 лет назад
github логотип
GHSA-r9jf-hf9x-7hrv

Exposure of Sensitive Information to an Unauthorized Actor Jenkins Script Security Plugin

CVSS3: 6.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу