Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS00aGhxLWozeHctd2o4Oc4AAknR

RCE vulnerability in SCM Filter Jervis Plugin

SCM Filter Jervis Plugin 0.2.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to configure jobs with the filter, or control the contents of a previously configured job’s SCM repository.

SCM Filter Jervis Plugin 0.3 configures its YAML parser to only instantiate safe types.

Permalink: https://github.com/advisories/GHSA-4hhq-j3xw-wj89
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00aGhxLWozeHctd2o4Oc4AAknR
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 4 months ago


CVSS Score: 8.8
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-4hhq-j3xw-wj89, CVE-2020-2189
References: Repository: https://github.com/jenkinsci/scm-filter-jervis-plugin
Blast Radius: 1.0

Affected Packages

maven:io.jenkins.plugins:scm-filter-jervis
Affected Version Ranges: <= 0.2.1
Fixed in: 0.3