[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] Jenkins Script Security Plugin 1.36 and earlier arbitrary file read vulnerability
From:       Daniel Beck <ml () beckweb ! net>
Date:       2018-01-25 15:59:35
Message-ID: 0B04A942-3122-44F7-9102-F714F14771EF () beckweb ! net
[Download RAW message or body]


> On 11. Dec 2017, at 15:27, Daniel Beck <ml@beckweb.net> wrote:
> 
> SECURITY-663
> Users with the ability to configure sandboxed Groovy scripts are able to
> use a type coercion feature in Groovy to create new `File` objects from
> strings. This allowed reading arbitrary files on the Jenkins master file
> system.
> 
> Such a type coercion is now subject to sandbox protection and considered
> to be a call to the `new File(String)` constructor for the purpose of
> in-process script approval.

CVE-2017-1000505

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic