All the vulnerabilites related to Jenkins Project - Jenkins Script Security Plugin
cve-2019-1003040
Vulnerability from cvelistv5
Published
2019-03-28 17:59
Modified
2024-08-05 03:07
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.55 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/03/28/2 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/107628 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2019:1423 | vendor-advisory, x_refsource_REDHAT | |
https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: 1.55 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:07:16.744Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/03/28/2" }, { "name": "107628", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107628" }, { "name": "RHSA-2019:1423", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1423" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "1.55 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.55 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:45:17.278Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/03/28/2" }, { "name": "107628", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107628" }, { "name": "RHSA-2019:1423", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1423" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-1003040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_value": "1.55 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.55 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-265" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/03/28/2" }, { "name": "107628", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107628" }, { "name": "RHSA-2019:1423", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1423" }, { "name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-1003040", "datePublished": "2019-03-28T17:59:29", "dateReserved": "2019-03-28T00:00:00", "dateUpdated": "2024-08-05T03:07:16.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10400
Vulnerability from cvelistv5
Published
2019-09-12 13:55
Modified
2024-08-04 22:24
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of subexpressions in increment and decrement expressions not involving actual assignment allowed attackers to execute arbitrary code in sandboxed scripts.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/09/12/2 | mailing-list, x_refsource_MLIST | |
https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: 1.62 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:24:17.837Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "1.62 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of subexpressions in increment and decrement expressions not involving actual assignment allowed attackers to execute arbitrary code in sandboxed scripts." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:48:53.536Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-10400", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_value": "1.62 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of subexpressions in increment and decrement expressions not involving actual assignment allowed attackers to execute arbitrary code in sandboxed scripts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-265" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" }, { "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-10400", "datePublished": "2019-09-12T13:55:15", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:24:17.837Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10431
Vulnerability from cvelistv5
Published
2019-10-01 13:45
Modified
2024-08-04 22:24
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.
References
▼ | URL | Tags |
---|---|---|
https://jenkins.io/security/advisory/2019-10-01/#SECURITY-1579 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2019/10/01/2 | mailing-list, x_refsource_MLIST | |
https://access.redhat.com/errata/RHSA-2019:4097 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:4055 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:4089 | vendor-advisory, x_refsource_REDHAT |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: 1.64 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:24:18.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-10-01/#SECURITY-1579" }, { "name": "[oss-security] 20191001 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/10/01/2" }, { "name": "RHSA-2019:4097", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4097" }, { "name": "RHSA-2019:4055", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4055" }, { "name": "RHSA-2019:4089", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4089" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "1.64 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:49:30.101Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-10-01/#SECURITY-1579" }, { "name": "[oss-security] 20191001 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/10/01/2" }, { "name": "RHSA-2019:4097", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4097" }, { "name": "RHSA-2019:4055", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4055" }, { "name": "RHSA-2019:4089", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4089" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-10431", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_value": "1.64 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-265" } ] } ] }, "references": { "reference_data": [ { "name": "https://jenkins.io/security/advisory/2019-10-01/#SECURITY-1579", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-10-01/#SECURITY-1579" }, { "name": "[oss-security] 20191001 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/10/01/2" }, { "name": "RHSA-2019:4097", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4097" }, { "name": "RHSA-2019:4055", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4055" }, { "name": "RHSA-2019:4089", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4089" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-10431", "datePublished": "2019-10-01T13:45:19", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:24:18.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10399
Vulnerability from cvelistv5
Published
2019-09-12 13:55
Modified
2024-08-04 22:24
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/09/12/2 | mailing-list, x_refsource_MLIST | |
https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: 1.62 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:24:16.948Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "1.62 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:48:52.350Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-10399", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_value": "1.62 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-265" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" }, { "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-10399", "datePublished": "2019-09-12T13:55:15", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:24:16.948Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45379
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 14:09
Severity ?
EPSS score ?
Summary
Jenkins Script Security Plugin 1189.vb_a_b_7c8fd5fde and earlier stores whole-script approvals as the SHA-1 hash of the script, making it vulnerable to collision attacks.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:57.037Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2564" }, { "name": "[oss-security] 20221115 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "lessThanOrEqual": "1189.vb_a_b_7c8fd5fde", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "unaffected", "version": "1175.1179.vea_f7532629e1" } ] } ], "descriptions": [ { "lang": "en", "value": "Jenkins Script Security Plugin 1189.vb_a_b_7c8fd5fde and earlier stores whole-script approvals as the SHA-1 hash of the script, making it vulnerable to collision attacks." } ], "providerMetadata": { "dateUpdated": "2023-10-24T14:26:08.195Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2564" }, { "name": "[oss-security] 20221115 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4" } ] } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2022-45379", "datePublished": "2022-11-15T00:00:00", "dateReserved": "2022-11-14T00:00:00", "dateUpdated": "2024-08-03T14:09:57.037Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2190
Vulnerability from cvelistv5
Published
2020-06-03 12:40
Modified
2024-08-04 07:01
Severity ?
EPSS score ?
Summary
Jenkins Script Security Plugin 1.72 and earlier does not correctly escape pending or approved classpath entries on the In-process Script Approval page, resulting in a stored cross-site scripting vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1866 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2020/06/03/3 | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:01:41.240Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1866" }, { "name": "[oss-security] 20200603 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/03/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "lessThanOrEqual": "1.72", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Jenkins Script Security Plugin 1.72 and earlier does not correctly escape pending or approved classpath entries on the In-process Script Approval page, resulting in a stored cross-site scripting vulnerability." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:06:40.466Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1866" }, { "name": "[oss-security] 20200603 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/03/3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2020-2190", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "1.72" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Jenkins Script Security Plugin 1.72 and earlier does not correctly escape pending or approved classpath entries on the In-process Script Approval page, resulting in a stored cross-site scripting vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1866", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1866" }, { "name": "[oss-security] 20200603 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/06/03/3" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2020-2190", "datePublished": "2020-06-03T12:40:23", "dateReserved": "2019-12-05T00:00:00", "dateUpdated": "2024-08-04T07:01:41.240Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43404
Vulnerability from cvelistv5
Published
2022-10-19 00:00
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability involving crafted constructor bodies and calls to sandbox-generated synthetic constructors in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:57.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%281%29" }, { "name": "[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "unaffected", "version": "1175.1177.vda_175b_77d144" }, { "lessThanOrEqual": "1183.v774b_0b_0a_a_451", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability involving crafted constructor bodies and calls to sandbox-generated synthetic constructors in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM." } ], "providerMetadata": { "dateUpdated": "2023-10-24T14:25:30.322Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%281%29" }, { "name": "[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3" } ] } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2022-43404", "datePublished": "2022-10-19T00:00:00", "dateReserved": "2022-10-18T00:00:00", "dateUpdated": "2024-08-03T13:32:57.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1003005
Vulnerability from cvelistv5
Published
2019-02-06 16:00
Modified
2024-08-05 03:00
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.50 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
References
▼ | URL | Tags |
---|---|---|
https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1292 | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2019:0739 | vendor-advisory, x_refsource_REDHAT | |
http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: 1.50 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:00:19.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1292" }, { "name": "RHSA-2019:0739", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0739" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "1.50 and earlier" } ] } ], "dateAssigned": "2019-02-06T00:00:00", "datePublic": "2019-01-28T00:00:00", "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.50 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:44:35.636Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1292" }, { "name": "RHSA-2019:0739", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0739" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "DATE_ASSIGNED": "2019-02-06T02:59:03.172123", "ID": "CVE-2019-1003005", "REQUESTER": "ml@beckweb.net", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_value": "1.50 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.50 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-693" } ] } ] }, "references": { "reference_data": [ { "name": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1292", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1292" }, { "name": "RHSA-2019:0739", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0739" }, { "name": "http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-1003005", "datePublished": "2019-02-06T16:00:00", "dateReserved": "2019-02-06T00:00:00", "dateUpdated": "2024-08-05T03:00:19.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1003029
Vulnerability from cvelistv5
Published
2019-03-08 21:00
Modified
2024-08-05 03:00
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM.
References
▼ | URL | Tags |
---|---|---|
https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%281%29 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/107476 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2019:0739 | vendor-advisory, x_refsource_REDHAT | |
http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: 1.53 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:00:19.425Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%281%29" }, { "name": "107476", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107476" }, { "name": "RHSA-2019:0739", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0739" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "1.53 and earlier" } ] } ], "dateAssigned": "2019-03-06T00:00:00", "datePublic": "2019-03-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:45:04.091Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%281%29" }, { "name": "107476", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107476" }, { "name": "RHSA-2019:0739", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0739" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "DATE_ASSIGNED": "2019-03-06T22:44:37.383669", "ID": "CVE-2019-1003029", "REQUESTER": "ml@beckweb.net", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_value": "1.53 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-693" } ] } ] }, "references": { "reference_data": [ { "name": "https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20(1)", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20(1)" }, { "name": "107476", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107476" }, { "name": "RHSA-2019:0739", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0739" }, { "name": "http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-1003029", "datePublished": "2019-03-08T21:00:00", "dateReserved": "2019-03-08T00:00:00", "dateUpdated": "2024-08-05T03:00:19.425Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43401
Vulnerability from cvelistv5
Published
2022-10-19 00:00
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:57.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%281%29" }, { "name": "[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "unaffected", "version": "1175.1177.vda_175b_77d144" }, { "lessThanOrEqual": "1183.v774b_0b_0a_a_451", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM." } ], "providerMetadata": { "dateUpdated": "2023-10-24T14:25:26.784Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%281%29" }, { "name": "[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3" } ] } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2022-43401", "datePublished": "2022-10-19T00:00:00", "dateReserved": "2022-10-18T00:00:00", "dateUpdated": "2024-08-03T13:32:57.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-30946
Vulnerability from cvelistv5
Published
2022-05-17 14:05
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
A cross-site request forgery (CSRF) vulnerability in Jenkins Script Security Plugin 1158.v7c1b_73a_69a_08 and earlier allows attackers to have Jenkins send an HTTP request to an attacker-specified webserver.
References
▼ | URL | Tags |
---|---|---|
https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2116 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2022/05/17/8 | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:39.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2116" }, { "name": "[oss-security] 20220517 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/17/8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "lessThanOrEqual": "1158.v7c1b_73a_69a_08", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "unaffected", "version": "1.78.1" }, { "status": "unaffected", "version": "1145.1148.vf6d17a_a_a_eef6" } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Script Security Plugin 1158.v7c1b_73a_69a_08 and earlier allows attackers to have Jenkins send an HTTP request to an attacker-specified webserver." } ], "providerMetadata": { "dateUpdated": "2023-10-24T14:21:40.293Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2116" }, { "name": "[oss-security] 20220517 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/17/8" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2022-30946", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "1158.v7c1b_73a_69a_08" }, { "version_affected": "!", "version_value": "1.78.1" }, { "version_affected": "!", "version_value": "1145.1148.vf6d17a_a_a_eef6" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Script Security Plugin 1158.v7c1b_73a_69a_08 and earlier allows attackers to have Jenkins send an HTTP request to an attacker-specified webserver." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352: Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2116", "refsource": "CONFIRM", "url": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2116" }, { "name": "[oss-security] 20220517 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/05/17/8" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2022-30946", "datePublished": "2022-05-17T14:05:52", "dateReserved": "2022-05-16T00:00:00", "dateUpdated": "2024-08-03T07:03:39.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2110
Vulnerability from cvelistv5
Published
2020-02-12 14:35
Modified
2024-08-04 07:01
Severity ?
EPSS score ?
Summary
Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations.
References
▼ | URL | Tags |
---|---|---|
https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1713 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2020/02/12/3 | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:01:39.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1713" }, { "name": "[oss-security] 20200212 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/02/12/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "lessThanOrEqual": "1.69", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:05:06.077Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1713" }, { "name": "[oss-security] 20200212 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/02/12/3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2020-2110", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "1.69" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-265" } ] } ] }, "references": { "reference_data": [ { "name": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1713", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1713" }, { "name": "[oss-security] 20200212 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/02/12/3" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2020-2110", "datePublished": "2020-02-12T14:35:40", "dateReserved": "2019-12-05T00:00:00", "dateUpdated": "2024-08-04T07:01:39.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10393
Vulnerability from cvelistv5
Published
2019-09-12 13:55
Modified
2024-08-04 22:17
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/09/12/2 | mailing-list, x_refsource_MLIST | |
https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: 1.62 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:17:20.653Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "1.62 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:48:45.290Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-10393", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_value": "1.62 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-265" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" }, { "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-10393", "datePublished": "2019-09-12T13:55:15", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:17:20.653Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1003024
Vulnerability from cvelistv5
Published
2019-02-20 21:00
Modified
2024-08-05 03:00
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
References
▼ | URL | Tags |
---|---|---|
https://jenkins.io/security/advisory/2019-02-19/#SECURITY-1320 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/107295 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2019:0739 | vendor-advisory, x_refsource_REDHAT |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: 1.52 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:00:19.284Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-02-19/#SECURITY-1320" }, { "name": "107295", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107295" }, { "name": "RHSA-2019:0739", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0739" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "1.52 and earlier" } ] } ], "dateAssigned": "2019-02-19T00:00:00", "datePublic": "2019-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:44:58.030Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-02-19/#SECURITY-1320" }, { "name": "107295", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107295" }, { "name": "RHSA-2019:0739", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0739" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "DATE_ASSIGNED": "2019-02-19T22:20:51.846360", "ID": "CVE-2019-1003024", "REQUESTER": "ml@beckweb.net", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_value": "1.52 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-693" } ] } ] }, "references": { "reference_data": [ { "name": "https://jenkins.io/security/advisory/2019-02-19/#SECURITY-1320", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-02-19/#SECURITY-1320" }, { "name": "107295", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107295" }, { "name": "RHSA-2019:0739", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0739" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-1003024", "datePublished": "2019-02-20T21:00:00", "dateReserved": "2019-02-20T00:00:00", "dateUpdated": "2024-08-05T03:00:19.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-34144
Vulnerability from cvelistv5
Published
2024-05-02 13:28
Modified
2024-08-02 02:42
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability involving crafted constructor bodies in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins Project | Jenkins Script Security Plugin |
Version: 0 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*" ], "defaultStatus": "unknown", "product": "script_security", "vendor": "jenkins", "versions": [ { "lessThanOrEqual": "1335.vf07d9ce377a_e", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-34144", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-02T15:28:35.384740Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T18:23:11.386Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.914Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Jenkins Security Advisory 2024-05-02", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2024-05-02/#SECURITY-3341" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/05/02/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Jenkins Script Security Plugin", "vendor": "Jenkins Project", "versions": [ { "lessThanOrEqual": "1335.vf07d9ce377a_e", "status": "affected", "version": "0", "versionType": "maven" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability involving crafted constructor bodies in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM." } ], "providerMetadata": { "dateUpdated": "2024-05-02T13:28:03.226Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "Jenkins Security Advisory 2024-05-02", "tags": [ "vendor-advisory" ], "url": "https://www.jenkins.io/security/advisory/2024-05-02/#SECURITY-3341" }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/02/3" } ] } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2024-34144", "datePublished": "2024-05-02T13:28:03.226Z", "dateReserved": "2024-04-30T20:53:08.611Z", "dateUpdated": "2024-08-02T02:42:59.914Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-24422
Vulnerability from cvelistv5
Published
2023-01-24 00:00
Modified
2024-08-02 10:56
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins Project | Jenkins Script Security Plugin |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:56:03.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins Project", "versions": [ { "lessThanOrEqual": "1228.vd93135a_2fb_25", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "unaffected", "version": "1175.1180.v36a_3fb_2dec9c" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM." } ], "providerMetadata": { "dateUpdated": "2023-10-24T12:48:10.460Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016" } ] } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2023-24422", "datePublished": "2023-01-24T00:00:00", "dateReserved": "2023-01-23T00:00:00", "dateUpdated": "2024-08-02T10:56:03.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-16538
Vulnerability from cvelistv5
Published
2019-11-21 14:11
Modified
2024-08-05 01:17
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.67 and earlier related to the handling of default parameter expressions in closures allowed attackers to execute arbitrary code in sandboxed scripts.
References
▼ | URL | Tags |
---|---|---|
https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1658 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2019/11/21/1 | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: 1.67 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:17:40.259Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1658" }, { "name": "[oss-security] 20191121 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/11/21/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "1.67 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.67 and earlier related to the handling of default parameter expressions in closures allowed attackers to execute arbitrary code in sandboxed scripts." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:50:24.932Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1658" }, { "name": "[oss-security] 20191121 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/11/21/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-16538", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_value": "1.67 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.67 and earlier related to the handling of default parameter expressions in closures allowed attackers to execute arbitrary code in sandboxed scripts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-265" } ] } ] }, "references": { "reference_data": [ { "name": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1658", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1658" }, { "name": "[oss-security] 20191121 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/11/21/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-16538", "datePublished": "2019-11-21T14:11:20", "dateReserved": "2019-09-20T00:00:00", "dateUpdated": "2024-08-05T01:17:40.259Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52549
Vulnerability from cvelistv5
Published
2024-11-13 20:53
Modified
2024-11-13 21:35
Severity ?
EPSS score ?
Summary
Jenkins Script Security Plugin 1367.vdf2fc45f229c and earlier, except 1365.1367.va_3b_b_89f8a_95b_ and 1362.1364.v4cf2dc5d8776, does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files on the controller file system.
References
▼ | URL | Tags |
---|---|---|
https://www.jenkins.io/security/advisory/2024-11-13/#SECURITY-3447 | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins Project | Jenkins Script Security Plugin |
Version: 0 Version: 1365.v4778ca_84b_de5 Version: 1366.vd44b_49a_5c85c |
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-52549", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T21:35:27.415468Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-13T21:35:30.700Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Jenkins Script Security Plugin", "vendor": "Jenkins Project", "versions": [ { "lessThanOrEqual": "1362.v67dc1f0e1b_b_3", "status": "affected", "version": "0", "versionType": "maven" }, { "status": "affected", "version": "1365.v4778ca_84b_de5" }, { "lessThanOrEqual": "1367.vdf2fc45f229c", "status": "affected", "version": "1366.vd44b_49a_5c85c", "versionType": "maven" } ] } ], "descriptions": [ { "lang": "en", "value": "Jenkins Script Security Plugin 1367.vdf2fc45f229c and earlier, except 1365.1367.va_3b_b_89f8a_95b_ and 1362.1364.v4cf2dc5d8776, does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files on the controller file system." } ], "providerMetadata": { "dateUpdated": "2024-11-13T20:53:00.291Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "Jenkins Security Advisory 2024-11-13", "tags": [ "vendor-advisory" ], "url": "https://www.jenkins.io/security/advisory/2024-11-13/#SECURITY-3447" } ] } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2024-52549", "datePublished": "2024-11-13T20:53:00.291Z", "dateReserved": "2024-11-12T15:28:28.980Z", "dateUpdated": "2024-11-13T21:35:30.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-34145
Vulnerability from cvelistv5
Published
2024-05-02 13:28
Modified
2024-08-02 02:43
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability involving sandbox-defined classes that shadow specific non-sandbox-defined classes in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins Project | Jenkins Script Security Plugin |
Version: 0 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*" ], "defaultStatus": "unknown", "product": "script_security", "vendor": "jenkins", "versions": [ { "lessThanOrEqual": "1335.vf07d9ce377a_e", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-34145", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-02T15:32:34.219525Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T18:23:32.356Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:43:00.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Jenkins Security Advisory 2024-05-02", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2024-05-02/#SECURITY-3341" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/05/02/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Jenkins Script Security Plugin", "vendor": "Jenkins Project", "versions": [ { "lessThanOrEqual": "1335.vf07d9ce377a_e", "status": "affected", "version": "0", "versionType": "maven" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability involving sandbox-defined classes that shadow specific non-sandbox-defined classes in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM." } ], "providerMetadata": { "dateUpdated": "2024-05-02T13:28:03.965Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "Jenkins Security Advisory 2024-05-02", "tags": [ "vendor-advisory" ], "url": "https://www.jenkins.io/security/advisory/2024-05-02/#SECURITY-3341" }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/02/3" } ] } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2024-34145", "datePublished": "2024-05-02T13:28:03.965Z", "dateReserved": "2024-04-30T20:53:08.612Z", "dateUpdated": "2024-08-02T02:43:00.455Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2134
Vulnerability from cvelistv5
Published
2020-03-09 15:00
Modified
2024-08-04 07:01
Severity ?
EPSS score ?
Summary
Sandbox protection in Jenkins Script Security Plugin 1.70 and earlier could be circumvented through crafted constructor calls and crafted constructor bodies.
References
▼ | URL | Tags |
---|---|---|
https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1754 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2020/03/09/1 | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:01:40.721Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1754" }, { "name": "[oss-security] 20200309 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/03/09/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "lessThanOrEqual": "1.70", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Sandbox protection in Jenkins Script Security Plugin 1.70 and earlier could be circumvented through crafted constructor calls and crafted constructor bodies." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:05:34.273Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1754" }, { "name": "[oss-security] 20200309 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/03/09/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2020-2134", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "1.70" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sandbox protection in Jenkins Script Security Plugin 1.70 and earlier could be circumvented through crafted constructor calls and crafted constructor bodies." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-693: Protection Mechanism Failure" } ] } ] }, "references": { "reference_data": [ { "name": "https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1754", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1754" }, { "name": "[oss-security] 20200309 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/03/09/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2020-2134", "datePublished": "2020-03-09T15:00:56", "dateReserved": "2019-12-05T00:00:00", "dateUpdated": "2024-08-04T07:01:40.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10394
Vulnerability from cvelistv5
Published
2019-09-12 13:55
Modified
2024-08-04 22:17
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions on the left-hand side of assignment expressions allowed attackers to execute arbitrary code in sandboxed scripts.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/09/12/2 | mailing-list, x_refsource_MLIST | |
https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: 1.62 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:17:20.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "1.62 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions on the left-hand side of assignment expressions allowed attackers to execute arbitrary code in sandboxed scripts." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:48:46.458Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-10394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_value": "1.62 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions on the left-hand side of assignment expressions allowed attackers to execute arbitrary code in sandboxed scripts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-265" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" }, { "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-10394", "datePublished": "2019-09-12T13:55:15", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:17:20.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10355
Vulnerability from cvelistv5
Published
2019-07-31 12:45
Modified
2024-08-04 22:17
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of type casts allowed attackers to execute arbitrary code in sandboxed scripts.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/07/31/1 | mailing-list, x_refsource_MLIST | |
https://access.redhat.com/errata/RHSA-2019:2651 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:2594 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:2662 | vendor-advisory, x_refsource_REDHAT | |
https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20%281%29 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: 1.61 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:17:20.427Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" }, { "name": "RHSA-2019:2651", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2651" }, { "name": "RHSA-2019:2594", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "RHSA-2019:2662", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2662" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20%281%29" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "1.61 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of type casts allowed attackers to execute arbitrary code in sandboxed scripts." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:48:00.639Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" }, { "name": "RHSA-2019:2651", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2651" }, { "name": "RHSA-2019:2594", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "RHSA-2019:2662", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2662" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20%281%29" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-10355", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_value": "1.61 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of type casts allowed attackers to execute arbitrary code in sandboxed scripts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-265" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" }, { "name": "RHSA-2019:2651", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2651" }, { "name": "RHSA-2019:2594", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "RHSA-2019:2662", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2662" }, { "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-10355", "datePublished": "2019-07-31T12:45:21", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:17:20.427Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2279
Vulnerability from cvelistv5
Published
2020-09-23 13:10
Modified
2024-08-04 07:01
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.74 and earlier allows attackers with permission to define sandboxed scripts to provide crafted return values or script binding content that can result in arbitrary code execution on the Jenkins controller JVM.
References
▼ | URL | Tags |
---|---|---|
https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-2020 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2020/09/23/1 | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:01:41.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-2020" }, { "name": "[oss-security] 20200923 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/09/23/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "lessThanOrEqual": "1.74", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "unaffected", "version": "1.66.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.74 and earlier allows attackers with permission to define sandboxed scripts to provide crafted return values or script binding content that can result in arbitrary code execution on the Jenkins controller JVM." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:08:25.909Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-2020" }, { "name": "[oss-security] 20200923 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/09/23/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2020-2279", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "1.74" }, { "version_affected": "!", "version_value": "1.66.5" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.74 and earlier allows attackers with permission to define sandboxed scripts to provide crafted return values or script binding content that can result in arbitrary code execution on the Jenkins controller JVM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-693: Protection Mechanism Failure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-2020", "refsource": "CONFIRM", "url": "https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-2020" }, { "name": "[oss-security] 20200923 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/09/23/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2020-2279", "datePublished": "2020-09-23T13:10:17", "dateReserved": "2019-12-05T00:00:00", "dateUpdated": "2024-08-04T07:01:41.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10356
Vulnerability from cvelistv5
Published
2019-07-31 12:45
Modified
2024-08-04 22:17
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of method pointer expressions allowed attackers to execute arbitrary code in sandboxed scripts.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/07/31/1 | mailing-list, x_refsource_MLIST | |
https://access.redhat.com/errata/RHSA-2019:2651 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:2594 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:2662 | vendor-advisory, x_refsource_REDHAT | |
https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20%282%29 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: 1.61 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:17:20.522Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" }, { "name": "RHSA-2019:2651", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2651" }, { "name": "RHSA-2019:2594", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "RHSA-2019:2662", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2662" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20%282%29" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "1.61 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of method pointer expressions allowed attackers to execute arbitrary code in sandboxed scripts." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:48:01.811Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" }, { "name": "RHSA-2019:2651", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2651" }, { "name": "RHSA-2019:2594", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "RHSA-2019:2662", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2662" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20%282%29" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-10356", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_value": "1.61 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of method pointer expressions allowed attackers to execute arbitrary code in sandboxed scripts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-265" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" }, { "name": "RHSA-2019:2651", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2651" }, { "name": "RHSA-2019:2594", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "RHSA-2019:2662", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2662" }, { "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-10356", "datePublished": "2019-07-31T12:45:21", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:17:20.522Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2135
Vulnerability from cvelistv5
Published
2020-03-09 15:00
Modified
2024-08-04 07:01
Severity ?
EPSS score ?
Summary
Sandbox protection in Jenkins Script Security Plugin 1.70 and earlier could be circumvented through crafted method calls on objects that implement GroovyInterceptable.
References
▼ | URL | Tags |
---|---|---|
https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1754 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2020/03/09/1 | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:01:41.104Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1754" }, { "name": "[oss-security] 20200309 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/03/09/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "lessThanOrEqual": "1.70", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Sandbox protection in Jenkins Script Security Plugin 1.70 and earlier could be circumvented through crafted method calls on objects that implement GroovyInterceptable." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:05:35.460Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1754" }, { "name": "[oss-security] 20200309 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/03/09/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2020-2135", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Script Security Plugin", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "1.70" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sandbox protection in Jenkins Script Security Plugin 1.70 and earlier could be circumvented through crafted method calls on objects that implement GroovyInterceptable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-693: Protection Mechanism Failure" } ] } ] }, "references": { "reference_data": [ { "name": "https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1754", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1754" }, { "name": "[oss-security] 20200309 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/03/09/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2020-2135", "datePublished": "2020-03-09T15:00:56", "dateReserved": "2019-12-05T00:00:00", "dateUpdated": "2024-08-04T07:01:41.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43403
Vulnerability from cvelistv5
Published
2022-10-19 00:00
Modified
2024-08-03 13:32
Severity ?
EPSS score ?
Summary
A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Jenkins project | Jenkins Script Security Plugin |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:57.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%281%29" }, { "name": "[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3" }, { "tags": [ "x_transferred" ], "url": "https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Script Security Plugin", "vendor": "Jenkins project", "versions": [ { "status": "unaffected", "version": "1175.1177.vda_175b_77d144" }, { "lessThanOrEqual": "1183.v774b_0b_0a_a_451", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM." } ], "providerMetadata": { "dateUpdated": "2023-10-24T14:25:29.099Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%281%29" }, { "name": "[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3" }, { "url": "https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/" } ] } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2022-43403", "datePublished": "2022-10-19T00:00:00", "dateReserved": "2022-10-18T00:00:00", "dateUpdated": "2024-08-03T13:32:57.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }