Jenkins Shared Library Version Override Plugin 17.v786074c9fce7 and earlier declares folder-scoped library overrides as trusted, so that they're not executed in the Script Security sandbox, allowing attackers with Item/Configure permission on a folder to configure a folder-scoped library override that runs without sandbox protection.
History

Wed, 13 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Jenkins
Jenkins shared Library Version Override
Weaknesses CWE-862
CPEs cpe:2.3:a:jenkins:shared_library_version_override:*:*:*:*:*:*:*:*
Vendors & Products Jenkins
Jenkins shared Library Version Override
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Nov 2024 21:00:00 +0000

Type Values Removed Values Added
Description Jenkins Shared Library Version Override Plugin 17.v786074c9fce7 and earlier declares folder-scoped library overrides as trusted, so that they're not executed in the Script Security sandbox, allowing attackers with Item/Configure permission on a folder to configure a folder-scoped library override that runs without sandbox protection.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published: 2024-11-13T20:53:03.613Z

Updated: 2024-11-13T21:36:03.550Z

Reserved: 2024-11-12T15:28:28.980Z

Link: CVE-2024-52554

cve-icon Vulnrichment

Updated: 2024-11-13T21:31:27.091Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-13T21:15:29.540

Modified: 2024-11-15T13:58:08.913

Link: CVE-2024-52554

cve-icon Redhat

No data.