Lucene search

K
JenkinsPipeline: Groovy

6 matches found

CVE
CVE
added 2022/02/15 5:15 p.m.206 views

CVE-2022-25173

Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier uses the same checkout directories for distinct SCMs when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted...

8.8CVSS8.5AI score0.01566EPSS
CVE
CVE
added 2019/01/22 2:29 p.m.145 views

CVE-2019-1003001

A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a p...

8.8CVSS8.8AI score0.93984EPSS
CVE
CVE
added 2020/02/12 3:15 p.m.112 views

CVE-2020-2109

Sandbox protection in Jenkins Pipeline: Groovy Plugin 2.78 and earlier can be circumvented through default parameter expressions in CPS-transformed methods.

8.8CVSS8.5AI score0.00475EPSS
CVE
CVE
added 2022/05/17 3:15 p.m.97 views

CVE-2022-30945

Jenkins Pipeline: Groovy Plugin 2689.v434009a_31b_f1 and earlier allows loading any Groovy source files on the classpath of Jenkins and Jenkins plugins in sandboxed pipelines.

8.5CVSS8.3AI score0.01487EPSS
CVE
CVE
added 2018/12/10 2:29 p.m.61 views

CVE-2018-1000866

A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers with Job/Configure permission,...

8.8CVSS8.9AI score0.00652EPSS
CVE
CVE
added 2017/10/05 1:29 a.m.48 views

CVE-2017-1000096

Arbitrary code execution due to incomplete sandbox protection: Constructors, instance variable initializers, and instance initializers in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with t...

8.8CVSS9.1AI score0.00195EPSS