In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2017-12-11/ | Vendor Advisory |
https://jenkins.io/security/advisory/2017-12-11/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://jenkins.io/security/advisory/2017-12-11/ - Vendor Advisory |
Information
Published : 2018-01-25 18:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000505
Mitre link : CVE-2017-1000505
CVE.ORG link : CVE-2017-1000505
JSON object : View
Products Affected
jenkins
- script_security
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor