oss-sec mailing list archives

Jenkins Script Security Plugin 1.36 and earlier arbitrary file read vulnerability


From: Daniel Beck <ml () beckweb net>
Date: Mon, 11 Dec 2017 15:27:43 +0100

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software. The following
plugin releases contain fixes for security vulnerabilities:

* Script Security Plugin 1.37

Users of these plugins should upgrade them to the indicated versions.

Descriptions of the vulnerabilities are below. Some more details, 
severity, and attribution can be found here:
https://jenkins.io/security/advisory/2017-12-11/

We provide advance notification for security updates on this mailing list:
https://groups.google.com/d/forum/jenkinsci-advisories

If you discover security vulnerabilities in Jenkins, please report them as
described here:
https://jenkins.io/security/#reporting-vulnerabilities

---

SECURITY-663
Users with the ability to configure sandboxed Groovy scripts are able to
use a type coercion feature in Groovy to create new `File` objects from
strings. This allowed reading arbitrary files on the Jenkins master file
system.

Such a type coercion is now subject to sandbox protection and considered
to be a call to the `new File(String)` constructor for the purpose of
in-process script approval.


Current thread: