
We found results for “”
CVE-2020-2279
Good to know:

Date: September 23, 2020
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.74 and earlier allows attackers with permission to define sandboxed scripts to provide crafted return values or script binding content that can result in arbitrary code execution on the Jenkins controller JVM.
Language: Java
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Protection Mechanism Failure
CWE-693Insufficient Information
NVD-CWE-noinfoTop Fix

Upgrade Version
Upgrade to version org.jenkins-ci.plugins:script-security:1.75;org.jenkins-ci.plugins:script-security:1.66.5
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | CHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | SINGLE |
Confidentiality (C): | PARTIAL |
Integrity (I): | PARTIAL |
Availability (A): | PARTIAL |
Additional information: |