You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Path to dependency file: /build.gradle
Path to vulnerable library: /es-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar
Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Path to dependency file: /build.gradle
Path to vulnerable library: /es-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar
A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Path to dependency file: /build.gradle
Path to vulnerable library: /es-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar
A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Path to dependency file: /build.gradle
Path to vulnerable library: /es-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar
A sandbox bypass vulnerability involving crafted constructor bodies and calls to sandbox-generated synthetic constructors in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Path to dependency file: /build.gradle
Path to vulnerable library: /es-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar
A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Path to dependency file: /build.gradle
Path to vulnerable library: /es-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar
Jenkins Script Security Plugin 1189.vb_a_b_7c8fd5fde and earlier stores whole-script approvals as the SHA-1 hash of the script, making it vulnerable to collision attacks.
mend-for-github-combot
changed the title
script-security-1172.v35f6a_0b_8207e.jar: 5 vulnerabilities (highest severity is: 9.9)
script-security-1172.v35f6a_0b_8207e.jar: 5 vulnerabilities (highest severity is: 9.9) - autoclosed
Dec 2, 2022
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
Vulnerable Library - script-security-1172.v35f6a_0b_8207e.jar
Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Path to dependency file: /build.gradle
Path to vulnerable library: /es-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar
Found in HEAD commit: 26696d30ae3a174047ee21ec6573e9b8b0bc1d1e
Vulnerabilities
Details
CVE-2022-43402
Vulnerable Library - script-security-1172.v35f6a_0b_8207e.jar
Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Path to dependency file: /build.gradle
Path to vulnerable library: /es-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar
Dependency Hierarchy:
Found in HEAD commit: 26696d30ae3a174047ee21ec6573e9b8b0bc1d1e
Found in base branch: main
Vulnerability Details
A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Publish Date: 2022-10-19
URL: CVE-2022-43402
CVSS 3 Score Details (9.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
Release Date: 2022-10-19
Fix Resolution: org.jenkins-ci.plugins:script-security:1184.v85d16b_d851b_3, org.jenkins-ci.plugins.workflow:workflow-cps:2803.v1a_f77ffcc773
⛑️ Automatic Remediation is available for this issue
CVE-2022-43401
Vulnerable Library - script-security-1172.v35f6a_0b_8207e.jar
Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Path to dependency file: /build.gradle
Path to vulnerable library: /es-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar
Dependency Hierarchy:
Found in HEAD commit: 26696d30ae3a174047ee21ec6573e9b8b0bc1d1e
Found in base branch: main
Vulnerability Details
A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Publish Date: 2022-10-19
URL: CVE-2022-43401
CVSS 3 Score Details (9.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
Release Date: 2022-10-19
Fix Resolution: org.jenkins-ci.plugins:script-security:1184.v85d16b_d851b_3, org.jenkins-ci.plugins.workflow:workflow-cps:2803.v1a_f77ffcc773
⛑️ Automatic Remediation is available for this issue
CVE-2022-43404
Vulnerable Library - script-security-1172.v35f6a_0b_8207e.jar
Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Path to dependency file: /build.gradle
Path to vulnerable library: /es-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar
Dependency Hierarchy:
Found in HEAD commit: 26696d30ae3a174047ee21ec6573e9b8b0bc1d1e
Found in base branch: main
Vulnerability Details
A sandbox bypass vulnerability involving crafted constructor bodies and calls to sandbox-generated synthetic constructors in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Publish Date: 2022-10-19
URL: CVE-2022-43404
CVSS 3 Score Details (9.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
Release Date: 2022-10-19
Fix Resolution: org.jenkins-ci.plugins:script-security:1184.v85d16b_d851b_3
⛑️ Automatic Remediation is available for this issue
CVE-2022-43403
Vulnerable Library - script-security-1172.v35f6a_0b_8207e.jar
Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Path to dependency file: /build.gradle
Path to vulnerable library: /es-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar
Dependency Hierarchy:
Found in HEAD commit: 26696d30ae3a174047ee21ec6573e9b8b0bc1d1e
Found in base branch: main
Vulnerability Details
A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Publish Date: 2022-10-19
URL: CVE-2022-43403
CVSS 3 Score Details (9.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)
Release Date: 2022-10-19
Fix Resolution: org.jenkins-ci.plugins:script-security:1184.v85d16b_d851b_3
⛑️ Automatic Remediation is available for this issue
CVE-2022-45379
Vulnerable Library - script-security-1172.v35f6a_0b_8207e.jar
Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Path to dependency file: /build.gradle
Path to vulnerable library: /es-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/script-security/1172.v35f6a_0b_8207e/d0e7c6465d3325d458f2686d72d2eab1db525ca9/script-security-1172.v35f6a_0b_8207e.jar
Dependency Hierarchy:
Found in HEAD commit: 26696d30ae3a174047ee21ec6573e9b8b0bc1d1e
Found in base branch: main
Vulnerability Details
Jenkins Script Security Plugin 1189.vb_a_b_7c8fd5fde and earlier stores whole-script approvals as the SHA-1 hash of the script, making it vulnerable to collision attacks.
Publish Date: 2022-11-15
URL: CVE-2022-45379
CVSS 3 Score Details (7.5)
Base Score Metrics:
⛑️ Automatic Remediation is available for this issue.
The text was updated successfully, but these errors were encountered: