2019-12-05 01:00:58 +00:00
{
"CVE_data_meta" : {
"ID" : "CVE-2020-2110" ,
2020-02-12 15:01:20 +00:00
"ASSIGNER" : "jenkinsci-cert@googlegroups.com" ,
"STATE" : "PUBLIC"
2020-02-12 10:52:57 +01:00
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Jenkins project" ,
"product" : {
"product_data" : [
{
"product_name" : "Jenkins Script Security Plugin" ,
"version" : {
"version_data" : [
{
"version_value" : "1.69" ,
"version_affected" : "<="
}
]
}
}
]
}
}
]
}
2019-12-05 01:00:58 +00:00
} ,
2020-02-12 10:52:57 +01:00
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2019-12-05 01:00:58 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2020-02-12 10:52:57 +01:00
"value" : "Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-265"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1713" ,
"url" : "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1713" ,
"refsource" : "CONFIRM"
2020-02-12 16:01:10 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20200212 Multiple vulnerabilities in Jenkins plugins" ,
"url" : "http://www.openwall.com/lists/oss-security/2020/02/12/3"
2019-12-05 01:00:58 +00:00
}
]
}
}