Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1yNWM3LXFjYzktNXY3bc4AARb2

Jenkins Pipeline Classpath Step plugin allowed Script Security sandbox bypass

It was found that the use of Pipeline: Classpath Step Jenkins plugin enables a bypass of the Script Security sandbox for users with SCM commit access, as well as users with e.g. Job/Configure permission in Jenkins.

Permalink: https://github.com/advisories/GHSA-r5c7-qcc9-5v7m
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yNWM3LXFjYzktNXY3bc4AARb2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: 3 months ago


CVSS Score: 8.5
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Identifiers: GHSA-r5c7-qcc9-5v7m, CVE-2017-2650
References: Blast Radius: 1.0

Affected Packages

maven:cprice404:pipeline-classpath
Affected Version Ranges: = 0.1.0
No known fixed version