[MAVEN:GHSA-72GX-QQ2M-6XR2] Improper Control of Generation of Code in Jenkins Script Security Plugin

Severity Critical
Affected Packages 1
Fixed Packages 1
CVEs 1

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.

Package Affected Version
pkg:maven/org.jenkins-ci.plugins/script-security <= 1.64
ID
MAVEN:GHSA-72GX-QQ2M-6XR2
Severity
critical
URL
https://github.com/advisories/GHSA-72gx-qq2m-6xr2
Published
2022-05-24T16:57:28
(2 years ago)
Modified
2023-10-26T18:53:31
(10 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/script-security org.jenkins-ci.plugins script-security <= 1.64
Fixed pkg:maven/org.jenkins-ci.plugins/script-security org.jenkins-ci.plugins script-security = 1.65
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...