Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0zaHZjLXh3anAteHI4bc4AASkb

Liquibase Runner Plugin allows users to load arbitrary Java code into controller JVM

An arbitrary code execution vulnerability exists in Liquibase Runner Plugin version 1.3.0 and older that allows an attacker with permission to configure jobs to load and execute arbitrary code on the Jenkins master JVM.

Permalink: https://github.com/advisories/GHSA-3hvc-xwjp-xr8m
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zaHZjLXh3anAteHI4bc4AASkb
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 5 months ago


CVSS Score: 8.8
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-3hvc-xwjp-xr8m, CVE-2018-1000146
References: Repository: https://github.com/jenkinsci/liquibase-runner-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:liquibase-runner
Affected Version Ranges: < 1.4.3
Fixed in: 1.4.3