Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <FBE17D96-D1AD-4F74-9D28-C82B19772071@beckweb.net>
Date: Mon, 11 Dec 2017 15:27:43 +0100
From: Daniel Beck <ml@...kweb.net>
To: oss-security@...ts.openwall.com
Subject: Jenkins Script Security Plugin 1.36 and earlier arbitrary file read
 vulnerability

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software. The following
plugin releases contain fixes for security vulnerabilities:

* Script Security Plugin 1.37

Users of these plugins should upgrade them to the indicated versions.

Descriptions of the vulnerabilities are below. Some more details, 
severity, and attribution can be found here:
https://jenkins.io/security/advisory/2017-12-11/

We provide advance notification for security updates on this mailing list:
https://groups.google.com/d/forum/jenkinsci-advisories

If you discover security vulnerabilities in Jenkins, please report them as
described here:
https://jenkins.io/security/#reporting-vulnerabilities

---

SECURITY-663
Users with the ability to configure sandboxed Groovy scripts are able to
use a type coercion feature in Groovy to create new `File` objects from
strings. This allowed reading arbitrary files on the Jenkins master file
system.

Such a type coercion is now subject to sandbox protection and considered
to be a call to the `new File(String)` constructor for the purpose of
in-process script approval.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.