Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <59BE1921-4A41-4927-86AF-78C8A74C6EDB@beckweb.net>
Date: Thu, 25 Jan 2018 09:58:09 +0100
From: Daniel Beck <ml@...kweb.net>
To: oss-security@...ts.openwall.com
Subject: Re: Jenkins EC2 Plugin 1.37 and earlier arbitrary
 shell command execution


> On 6. Dec 2017, at 14:37, Daniel Beck <ml@...kweb.net> wrote:
> 
> SECURITY-643
> Users with permission to create or configure agents in Jenkins could
> configure an EC2 agent to run arbitrary shell commands on the master node
> whenever the agent was supposed to be launched.
> 
> Configuration of these agents now requires the 'Run Scripts' permission
> typically only granted to administrators.

CVE-2017-1000502

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.