Unsafe methods in the default list of approved signatures in Jenkins Script Security Plugin
Moderate severity
GitHub Reviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Jan 30, 2024
Package
Affected versions
<= 1.29
Patched versions
1.29.1
Description
Published by the National Vulnerability Database
Oct 5, 2017
Published to the GitHub Advisory Database
May 13, 2022
Reviewed
Jan 30, 2024
Last updated
Jan 30, 2024
The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['rawBuild'] rather than currentBuild.rawBuild. Additionally, the following entries allowed accessing private data that would not be accessible otherwise due to script security: groovy.json.JsonOutput.toJson(Closure); groovy.json.JsonOutput.toJson(Object).
References