Vulnerability Name: | CVE-2017-1000505 (CCN-138305) | ||||||||||||
Assigned: | 2017-12-11 | ||||||||||||
Published: | 2017-12-11 | ||||||||||||
Updated: | 2018-02-09 | ||||||||||||
Summary: | In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval. | ||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-1000505 Source: CCN Type: oss-sec Mailing List, Thu, 25 Jan 2018 16:59:35 +0100 Re: Jenkins Script Security Plugin 1.36 and earlier arbitrary file read vulnerability Source: XF Type: UNKNOWN jenkins-cve20171000505-info-disc(138305) Source: CCN Type: Jenkins Security Advisory 2017-12-11 Arbitrary file read vulnerability in Script Security Plugin Source: CONFIRM Type: Vendor Advisory https://jenkins.io/security/advisory/2017-12-11/ Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-1000505 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |