6.5
CVSSv3

CVE-2017-1000095

Published: 05/10/2017 Updated: 03/10/2019
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['rawBuild'] rather than currentBuild.rawBuild. Additionally, the following entries allowed accessing private data that would not be accessible otherwise due to script security: groovy.json.JsonOutput.toJson(Closure); groovy.json.JsonOutput.toJson(Object).

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins script security 1.34

Vendor Advisories

The jenkins-plugin-script-security improperly whitelisted "DefaultGroovyMethodsputAt(Object, String, Object)" and "DefaultGroovyMethodsgetAt(Object, String)" which allows attackers to bypass many restrictions and potentially trigger builds or access data they should not have access to Exploitation of this requires the attacker to have access to ...