Date: Thu, 25 Jan 2018 16:59:35 +0100 From: Daniel Beck <ml@...kweb.net> To: oss-security@...ts.openwall.com Subject: Re: Jenkins Script Security Plugin 1.36 and earlier arbitrary file read vulnerability > On 11. Dec 2017, at 15:27, Daniel Beck <ml@...kweb.net> wrote: > > SECURITY-663 > Users with the ability to configure sandboxed Groovy scripts are able to > use a type coercion feature in Groovy to create new `File` objects from > strings. This allowed reading arbitrary files on the Jenkins master file > system. > > Such a type coercion is now subject to sandbox protection and considered > to be a call to the `new File(String)` constructor for the purpose of > in-process script approval. CVE-2017-1000505
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ