VYPR

Maven package

org.jenkins-ci.plugins/script-security

pkg:maven/org.jenkins-ci.plugins/script-security

Vulnerabilities (35)

  • CVE-2019-10393Sep 12, 2019
    affected < 1.63fixed 1.63

    A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts.

  • CVE-2019-10356Jul 31, 2019
    affected < 1.62fixed 1.62

    A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of method pointer expressions allowed attackers to execute arbitrary code in sandboxed scripts.

  • CVE-2019-10355Jul 31, 2019
    affected < 1.62fixed 1.62

    A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of type casts allowed attackers to execute arbitrary code in sandboxed scripts.

  • CVE-2019-1003040Mar 28, 2019
    affected < 1.56fixed 1.56

    A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.55 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts.

  • CVE-2019-1003029KEVMar 8, 2019
    affected < 1.54fixed 1.54

    A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows

  • CVE-2019-1003024Feb 20, 2019
    affected < 1.53fixed 1.53

    A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenk

  • CVE-2019-1003005Feb 6, 2019
    affected < 1.51fixed 1.51

    A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.50 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint

  • CVE-2019-1003001Jan 22, 2019
    affected < 1.50fixed 1.50

    A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permis

  • CVE-2019-1003000Jan 22, 2019
    affected < 1.50fixed 1.50

    A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java that allows attackers with the ability to provide sandboxed scripts to execute arbitrary code on the Jenkins ma

  • CVE-2018-1000866Dec 10, 2018
    affected < 1.48fixed 1.48

    A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers with Job/Co

  • CVE-2018-1000865Dec 10, 2018
    affected < 1.48fixed 1.48

    A sandbox bypass vulnerability exists in Script Security Plugin 1.47 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM, if plugins

  • CVE-2017-1000505Jan 25, 2018
    affected < 1.37fixed 1.37

    In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file sy

  • CVE-2017-1000107HigOct 5, 2017
    affected < 1.31fixed 1.31

    Script Security Plugin did not apply sandboxing restrictions to constructor invocations via positional arguments list, super constructor invocations, method references, and type coercion expressions. This could be used to invoke arbitrary constructors and methods, bypassing sandb

  • CVE-2017-1000095MedOct 5, 2017
    affected < 1.29.1fixed 1.29.1

    The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['r

  • CVE-2016-3102HigFeb 9, 2017
    affected < 1.18.1fixed 1.18.1

    The Script Security plugin before 1.18.1 in Jenkins might allow remote attackers to bypass a Groovy sandbox protection mechanism via a plugin that performs (1) direct field access or (2) get/set array operations.

Page 2 of 2