From 3eef94b7e8f2e677d4e494b29b01c6600893e9ea Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 25 Jan 2018 13:02:41 -0500 Subject: [PATCH] - Synchronized data. --- 2017/1000xxx/CVE-2017-1000505.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2017/1000xxx/CVE-2017-1000505.json b/2017/1000xxx/CVE-2017-1000505.json index 4722d358f33..420b53fc53e 100644 --- a/2017/1000xxx/CVE-2017-1000505.json +++ b/2017/1000xxx/CVE-2017-1000505.json @@ -36,7 +36,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "In Jenkins Script Security Plugin version 1.36 and earlier users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval." + "value" : "In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval." } ] },