The Script Security plugin before 1.18.1 in Jenkins might allow remote attackers to bypass a Groovy sandbox protection mechanism via a plugin that performs (1) direct field access or (2) get/set array operations.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Script_security | Jenkins | 1.0 (including) | 1.0 (including) |
Script_security | Jenkins | 1.1 (including) | 1.1 (including) |
Script_security | Jenkins | 1.2 (including) | 1.2 (including) |
Script_security | Jenkins | 1.3 (including) | 1.3 (including) |
Script_security | Jenkins | 1.4 (including) | 1.4 (including) |
Script_security | Jenkins | 1.5 (including) | 1.5 (including) |
Script_security | Jenkins | 1.6 (including) | 1.6 (including) |
Script_security | Jenkins | 1.7 (including) | 1.7 (including) |
Script_security | Jenkins | 1.8 (including) | 1.8 (including) |
Script_security | Jenkins | 1.9 (including) | 1.9 (including) |
Script_security | Jenkins | 1.10 (including) | 1.10 (including) |
Script_security | Jenkins | 1.11 (including) | 1.11 (including) |
Script_security | Jenkins | 1.12 (including) | 1.12 (including) |
Script_security | Jenkins | 1.13 (including) | 1.13 (including) |
Script_security | Jenkins | 1.14 (including) | 1.14 (including) |
Script_security | Jenkins | 1.15 (including) | 1.15 (including) |
Script_security | Jenkins | 1.16 (including) | 1.16 (including) |
Script_security | Jenkins | 1.17 (including) | 1.17 (including) |
Script_security | Jenkins | 1.18 (including) | 1.18 (including) |
Jenkins | Ubuntu | precise | * |