CVE-2022-43402
- EPSS 0.1%
- Veröffentlicht 19.10.2022 16:15:10
- Zuletzt bearbeitet 21.11.2024 07:26:24
A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier allows attackers with permission to define and run sandboxed scripts, inclu...
CVE-2022-30945
- EPSS 1.49%
- Veröffentlicht 17.05.2022 15:15:08
- Zuletzt bearbeitet 21.11.2024 07:03:36
Jenkins Pipeline: Groovy Plugin 2689.v434009a_31b_f1 and earlier allows loading any Groovy source files on the classpath of Jenkins and Jenkins plugins in sandboxed pipelines.
CVE-2022-25173
- EPSS 2.26%
- Veröffentlicht 15.02.2022 17:15:08
- Zuletzt bearbeitet 21.11.2024 06:51:44
Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier uses the same checkout directories for distinct SCMs when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers with Item/Configure permission to invoke arbitr...
CVE-2022-25176
- EPSS 0.64%
- Veröffentlicht 15.02.2022 17:15:08
- Zuletzt bearbeitet 21.11.2024 06:51:45
Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers able to...
CVE-2022-25180
- EPSS 0.51%
- Veröffentlicht 15.02.2022 17:15:08
- Zuletzt bearbeitet 21.11.2024 06:51:45
Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier includes password parameters from the original build in replayed builds, allowing attackers with Run/Replay permission to obtain the values of password parameters passed to previous build...
CVE-2020-2109
- EPSS 0.48%
- Veröffentlicht 12.02.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:24:39
Sandbox protection in Jenkins Pipeline: Groovy Plugin 2.78 and earlier can be circumvented through default parameter expressions in CPS-transformed methods.
CVE-2019-1003041
- EPSS 2.25%
- Veröffentlicht 28.03.2019 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:17:47
A sandbox bypass vulnerability in Jenkins Pipeline: Groovy Plugin 2.64 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts.
CVE-2019-1003030
- EPSS 93.01%
- Veröffentlicht 08.03.2019 21:29:00
- Zuletzt bearbeitet 20.02.2025 18:04:29
A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary cod...
CVE-2019-1003001
- EPSS 93.98%
- Veröffentlicht 22.01.2019 14:29:00
- Zuletzt bearbeitet 21.11.2024 04:17:43
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows atta...
CVE-2018-1000866
- EPSS 0.64%
- Veröffentlicht 10.12.2018 14:29:01
- Zuletzt bearbeitet 21.11.2024 03:40:31
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java tha...