|
Message-Id: <0B04A942-3122-44F7-9102-F714F14771EF@beckweb.net> Date: Thu, 25 Jan 2018 16:59:35 +0100 From: Daniel Beck <ml@...kweb.net> To: oss-security@...ts.openwall.com Subject: Re: Jenkins Script Security Plugin 1.36 and earlier arbitrary file read vulnerability > On 11. Dec 2017, at 15:27, Daniel Beck <ml@...kweb.net> wrote: > > SECURITY-663 > Users with the ability to configure sandboxed Groovy scripts are able to > use a type coercion feature in Groovy to create new `File` objects from > strings. This allowed reading arbitrary files on the Jenkins master file > system. > > Such a type coercion is now subject to sandbox protection and considered > to be a call to the `new File(String)` constructor for the purpose of > in-process script approval. CVE-2017-1000505
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.