CVE-2017-1000505

In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.
References
Link Resource
https://jenkins.io/security/advisory/2017-12-11/ Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*

History

No history.

Information

Published : 2018-01-25 18:29

Updated : 2024-02-28 16:25


NVD link : CVE-2017-1000505

Mitre link : CVE-2017-1000505

CVE.ORG link : CVE-2017-1000505


JSON object : View

Products Affected

jenkins

  • script_security
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor