Vulnerability Details CVE-2017-1000505
In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 55.5%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 4.0
Products affected by CVE-2017-1000505
-
cpe:2.3:a:jenkins:script_security:1.0
-
cpe:2.3:a:jenkins:script_security:1.1
-
cpe:2.3:a:jenkins:script_security:1.10
-
cpe:2.3:a:jenkins:script_security:1.11
-
cpe:2.3:a:jenkins:script_security:1.12
-
cpe:2.3:a:jenkins:script_security:1.13
-
cpe:2.3:a:jenkins:script_security:1.14
-
cpe:2.3:a:jenkins:script_security:1.15
-
cpe:2.3:a:jenkins:script_security:1.16
-
cpe:2.3:a:jenkins:script_security:1.17
-
cpe:2.3:a:jenkins:script_security:1.18
-
cpe:2.3:a:jenkins:script_security:1.18.1
-
cpe:2.3:a:jenkins:script_security:1.19
-
cpe:2.3:a:jenkins:script_security:1.2
-
cpe:2.3:a:jenkins:script_security:1.20
-
cpe:2.3:a:jenkins:script_security:1.21
-
cpe:2.3:a:jenkins:script_security:1.22
-
cpe:2.3:a:jenkins:script_security:1.23
-
cpe:2.3:a:jenkins:script_security:1.24
-
cpe:2.3:a:jenkins:script_security:1.25
-
cpe:2.3:a:jenkins:script_security:1.26
-
cpe:2.3:a:jenkins:script_security:1.27
-
cpe:2.3:a:jenkins:script_security:1.28
-
cpe:2.3:a:jenkins:script_security:1.29
-
cpe:2.3:a:jenkins:script_security:1.29.1
-
cpe:2.3:a:jenkins:script_security:1.3
-
cpe:2.3:a:jenkins:script_security:1.30
-
cpe:2.3:a:jenkins:script_security:1.31
-
cpe:2.3:a:jenkins:script_security:1.32
-
cpe:2.3:a:jenkins:script_security:1.33
-
cpe:2.3:a:jenkins:script_security:1.34
-
cpe:2.3:a:jenkins:script_security:1.35
-
cpe:2.3:a:jenkins:script_security:1.36
-
cpe:2.3:a:jenkins:script_security:1.4
-
cpe:2.3:a:jenkins:script_security:1.5
-
cpe:2.3:a:jenkins:script_security:1.6
-
cpe:2.3:a:jenkins:script_security:1.7
-
cpe:2.3:a:jenkins:script_security:1.8
-
cpe:2.3:a:jenkins:script_security:1.9