First published: Thu Feb 09 2017(Updated: )
The Script Security plugin before 1.18.1 in Jenkins might allow remote attackers to bypass a Groovy sandbox protection mechanism via a plugin that performs (1) direct field access or (2) get/set array operations.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Script Security | =1.0 | |
Jenkins Script Security | =1.1 | |
Jenkins Script Security | =1.2 | |
Jenkins Script Security | =1.3 | |
Jenkins Script Security | =1.4 | |
Jenkins Script Security | =1.5 | |
Jenkins Script Security | =1.6 | |
Jenkins Script Security | =1.7 | |
Jenkins Script Security | =1.8 | |
Jenkins Script Security | =1.9 | |
Jenkins Script Security | =1.10 | |
Jenkins Script Security | =1.11 | |
Jenkins Script Security | =1.12 | |
Jenkins Script Security | =1.13 | |
Jenkins Script Security | =1.14 | |
Jenkins Script Security | =1.15 | |
Jenkins Script Security | =1.16 | |
Jenkins Script Security | =1.17 | |
Jenkins Script Security | =1.18 | |
maven/org.jenkins-ci.plugins:script-security | <1.18.1 | 1.18.1 |
=1.0 | ||
=1.1 | ||
=1.2 | ||
=1.3 | ||
=1.4 | ||
=1.5 | ||
=1.6 | ||
=1.7 | ||
=1.8 | ||
=1.9 | ||
=1.10 | ||
=1.11 | ||
=1.12 | ||
=1.13 | ||
=1.14 | ||
=1.15 | ||
=1.16 | ||
=1.17 | ||
=1.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3102 is classified as a medium severity vulnerability.
To fix CVE-2016-3102, upgrade the Script Security plugin to version 1.18.1 or later.
CVE-2016-3102 affects installations of Jenkins with Script Security plugin versions prior to 1.18.1.
CVE-2016-3102 is a sandbox bypass vulnerability that allows attackers to execute unauthorized script operations.
Yes, CVE-2016-3102 can be exploited by remote attackers due to the nature of the sandbox bypass.