cvelist/2020/2xxx/CVE-2020-2110.json

68 lines
2.2 KiB
JSON
Raw Normal View History

2019-12-05 01:00:58 +00:00
{
"CVE_data_meta": {
"ID": "CVE-2020-2110",
2020-02-12 15:01:20 +00:00
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
2020-02-12 10:52:57 +01:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins Script Security Plugin",
"version": {
"version_data": [
{
"version_value": "1.69",
"version_affected": "<="
}
]
}
}
]
}
}
]
}
2019-12-05 01:00:58 +00:00
},
2020-02-12 10:52:57 +01:00
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2019-12-05 01:00:58 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-02-12 10:52:57 +01:00
"value": "Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-265"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1713",
"url": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1713",
"refsource": "CONFIRM"
2020-02-12 16:01:10 +00:00
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200212 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2020/02/12/3"
2019-12-05 01:00:58 +00:00
}
]
}
}