Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 25 Jan 2018 16:59:35 +0100
From: Daniel Beck <ml@...kweb.net>
To: oss-security@...ts.openwall.com
Subject: Re: Jenkins Script Security Plugin 1.36 and earlier
 arbitrary file read vulnerability


> On 11. Dec 2017, at 15:27, Daniel Beck <ml@...kweb.net> wrote:
> 
> SECURITY-663
> Users with the ability to configure sandboxed Groovy scripts are able to
> use a type coercion feature in Groovy to create new `File` objects from
> strings. This allowed reading arbitrary files on the Jenkins master file
> system.
> 
> Such a type coercion is now subject to sandbox protection and considered
> to be a call to the `new File(String)` constructor for the purpose of
> in-process script approval.

CVE-2017-1000505

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.