Vulnerability CVE-2017-1000096


Published: 2017-10-04   Modified: 2017-10-05

Description:
Arbitrary code execution due to incomplete sandbox protection: Constructors, instance variable initializers, and instance initializers in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles.

Type:

CWE-732

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Jenkins -> Pipeline 

 References:
http://www.securityfocus.com/bid/99571
https://jenkins.io/security/advisory/2017-07-10/

Copyright 2024, cxsecurity.com

 

Back to Top