[MAVEN:GHSA-MHWQ-4MH7-FV7C] Arbitrary code execution due to incomplete sandbox protection in Jenkins Pipeline

Severity High
Affected Packages 1
Fixed Packages 1
CVEs 1

Arbitrary code execution due to incomplete sandbox protection: Constructors, instance variable initializers, and instance initializers in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles.

ID
MAVEN:GHSA-MHWQ-4MH7-FV7C
Severity
high
URL
https://github.com/advisories/GHSA-mhwq-4mh7-fv7c
Published
2022-05-13T01:40:55
(2 years ago)
Modified
2024-01-30T22:45:56
(7 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps org.jenkins-ci.plugins.workflow workflow-cps <= 2.36
Fixed pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps org.jenkins-ci.plugins.workflow workflow-cps = 2.36.1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...