ID CVE-2016-3102
Summary The Script Security plugin before 1.18.1 in Jenkins might allow remote attackers to bypass a Groovy sandbox protection mechanism via a plugin that performs (1) direct field access or (2) get/set array operations.
References
Vulnerable Configurations
  • cpe:2.3:a:jenkins:script_security:1.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.3:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.3:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.4:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.4:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.5:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.5:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.6:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.6:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.7:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.7:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.8:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.8:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.9:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.9:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.10:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.10:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.11:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.11:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.12:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.12:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.13:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.13:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.14:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.14:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.15:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.15:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.16:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.16:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.17:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.17:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:script_security:1.18:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:script_security:1.18:*:*:*:*:jenkins:*:*
CVSS
Base: 7.5 (as of 28-02-2017 - 17:37)
Impact:
Exploitability:
CWE CWE-254
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-04-11
Last major update 28-02-2017 - 17:37
Published 09-02-2017 - 15:59
Last modified 28-02-2017 - 17:37
Back to Top