CVE-2017-1000505 – org.jenkins-ci.plugins:script-security
Package
Manager: maven
Name: org.jenkins-ci.plugins:script-security
Vulnerable Version: >=0 <1.37
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00316 pctl0.54104
Details
Exposure of Sensitive Information to an Unauthorized Actor Jenkins Script Security Plugin In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.
Metadata
Created: 2022-05-14T03:45:23Z
Modified: 2022-07-01T21:43:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-r9jf-hf9x-7hrv/GHSA-r9jf-hf9x-7hrv.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-r9jf-hf9x-7hrv
Finding: F310
Auto approve: 1