|
Message-Id: <FBE17D96-D1AD-4F74-9D28-C82B19772071@beckweb.net> Date: Mon, 11 Dec 2017 15:27:43 +0100 From: Daniel Beck <ml@...kweb.net> To: oss-security@...ts.openwall.com Subject: Jenkins Script Security Plugin 1.36 and earlier arbitrary file read vulnerability Jenkins is an open source automation server which enables developers around the world to reliably build, test, and deploy their software. The following plugin releases contain fixes for security vulnerabilities: * Script Security Plugin 1.37 Users of these plugins should upgrade them to the indicated versions. Descriptions of the vulnerabilities are below. Some more details, severity, and attribution can be found here: https://jenkins.io/security/advisory/2017-12-11/ We provide advance notification for security updates on this mailing list: https://groups.google.com/d/forum/jenkinsci-advisories If you discover security vulnerabilities in Jenkins, please report them as described here: https://jenkins.io/security/#reporting-vulnerabilities --- SECURITY-663 Users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.