[MAVEN:GHSA-M68X-CC2F-GR5H] Unsafe methods in the default list of approved signatures in Jenkins Script Security Plugin
Severity
Moderate
Affected Packages
1
Fixed Packages
1
CVEs
1
The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['rawBuild'] rather than currentBuild.rawBuild. Additionally, the following entries allowed accessing private data that would not be accessible otherwise due to script security: groovy.json.JsonOutput.toJson(Closure); groovy.json.JsonOutput.toJson(Object).
Package | Affected Version |
---|---|
pkg:maven/org.jenkins-ci.plugins/script-security | <= 1.29 |
Package | Fixed Version |
---|---|
pkg:maven/org.jenkins-ci.plugins/script-security | = 1.29.1 |
- ID
- MAVEN:GHSA-M68X-CC2F-GR5H
- Severity
- moderate
- URL
- https://github.com/advisories/GHSA-m68x-cc2f-gr5h
- Published
-
2022-05-13T01:40:54
(2 years ago) - Modified
-
2024-01-30T22:46:08
(7 months ago) - Rights
- Maven Security Team
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.jenkins-ci.plugins/script-security | org.jenkins-ci.plugins | script-security | <= 1.29 | |||
Fixed | pkg:maven/org.jenkins-ci.plugins/script-security | org.jenkins-ci.plugins | script-security | = 1.29.1 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |