oss-sec mailing list archives
Jenkins Script Security Plugin 1.36 and earlier arbitrary file read vulnerability
From: Daniel Beck <ml () beckweb net>
Date: Mon, 11 Dec 2017 15:27:43 +0100
Jenkins is an open source automation server which enables developers around the world to reliably build, test, and deploy their software. The following plugin releases contain fixes for security vulnerabilities: * Script Security Plugin 1.37 Users of these plugins should upgrade them to the indicated versions. Descriptions of the vulnerabilities are below. Some more details, severity, and attribution can be found here: https://jenkins.io/security/advisory/2017-12-11/ We provide advance notification for security updates on this mailing list: https://groups.google.com/d/forum/jenkinsci-advisories If you discover security vulnerabilities in Jenkins, please report them as described here: https://jenkins.io/security/#reporting-vulnerabilities --- SECURITY-663 Users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.
Current thread:
- Jenkins Script Security Plugin 1.36 and earlier arbitrary file read vulnerability Daniel Beck (Dec 11)