Arbitrary File Read Affecting org.jenkins-ci.plugins:script-security package, versions [,1.37)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGJENKINSCIPLUGINS-32171
  • published8 Apr 2018
  • disclosed1 Dec 2017
  • creditGregory Draperi

Introduced: 1 Dec 2017

CVE-2017-1000505  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade org.jenkins-ci.plugins:script-security to version 1.37 or higher.

Overview

org.jenkins-ci.plugins:script-security allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.

Affected versions of this package are vulnerable to Arbitrary File Read. Users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new File objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the new File(String) constructor for the purpose of in-process script approval.

CVSS Scores

version 3.1