Vulnerability Name:

CVE-2017-1000505 (CCN-138305)

Assigned:2017-12-11
Published:2017-12-11
Updated:2018-02-09
Summary:In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2017-1000505

Source: CCN
Type: oss-sec Mailing List, Thu, 25 Jan 2018 16:59:35 +0100
Re: Jenkins Script Security Plugin 1.36 and earlier arbitrary file read vulnerability

Source: XF
Type: UNKNOWN
jenkins-cve20171000505-info-disc(138305)

Source: CCN
Type: Jenkins Security Advisory 2017-12-11
Arbitrary file read vulnerability in Script Security Plugin

Source: CONFIRM
Type: Vendor Advisory
https://jenkins.io/security/advisory/2017-12-11/

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2017-1000505

Vulnerable Configuration:Configuration 1:
  • cpe:/a:jenkins:script_security:*:*:*:*:*:jenkins:*:* (Version <= 1.36)

  • Configuration CCN 1:
  • cpe:/a:jenkins:script_security:1.36:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    jenkins script security *
    jenkins script security 1.36