Script security bypass vulnerability in Jenkins Shared Library Version Override Plugin
High severity
GitHub Reviewed
Published
Nov 13, 2024
to the GitHub Advisory Database
•
Updated Nov 14, 2024
Package
Affected versions
< 19.v3a
Patched versions
19.v3a
Description
Published by the National Vulnerability Database
Nov 13, 2024
Published to the GitHub Advisory Database
Nov 13, 2024
Reviewed
Nov 14, 2024
Last updated
Nov 14, 2024
Jenkins Shared Library Version Override Plugin 17.v786074c9fce7 and earlier declares folder-scoped library overrides as trusted, so that they're not executed in the Script Security sandbox, allowing attackers with Item/Configure permission on a folder to configure a folder-scoped library override that runs without sandbox protection. This allows attackers with Item/Configure permission on a folder to configure a folder-scoped library override that runs without sandbox protection. Shared Library Version Override Plugin 19.v3a_c975738d4a_ declares folder-scoped library overrides as untrusted, so that they’re executed in the Script Security sandbox.
References