[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] Jenkins Script Security Plugin 1.36 and earlier arbitrary file read vulnerability
From: Daniel Beck <ml () beckweb ! net>
Date: 2018-01-25 15:59:35
Message-ID: 0B04A942-3122-44F7-9102-F714F14771EF () beckweb ! net
[Download RAW message or body]
> On 11. Dec 2017, at 15:27, Daniel Beck <ml@beckweb.net> wrote:
>
> SECURITY-663
> Users with the ability to configure sandboxed Groovy scripts are able to
> use a type coercion feature in Groovy to create new `File` objects from
> strings. This allowed reading arbitrary files on the Jenkins master file
> system.
>
> Such a type coercion is now subject to sandbox protection and considered
> to be a call to the `new File(String)` constructor for the purpose of
> in-process script approval.
CVE-2017-1000505
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic