First published: Thu Feb 09 2017(Updated: )
The Script Security plugin before 1.18.1 in Jenkins might allow remote attackers to bypass a Groovy sandbox protection mechanism via a plugin that performs (1) direct field access or (2) get/set array operations.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Script Security | =1.0 | |
Jenkins Script Security | =1.1 | |
Jenkins Script Security | =1.2 | |
Jenkins Script Security | =1.3 | |
Jenkins Script Security | =1.4 | |
Jenkins Script Security | =1.5 | |
Jenkins Script Security | =1.6 | |
Jenkins Script Security | =1.7 | |
Jenkins Script Security | =1.8 | |
Jenkins Script Security | =1.9 | |
Jenkins Script Security | =1.10 | |
Jenkins Script Security | =1.11 | |
Jenkins Script Security | =1.12 | |
Jenkins Script Security | =1.13 | |
Jenkins Script Security | =1.14 | |
Jenkins Script Security | =1.15 | |
Jenkins Script Security | =1.16 | |
Jenkins Script Security | =1.17 | |
Jenkins Script Security | =1.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.