mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
68 lines
2.2 KiB
JSON
68 lines
2.2 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2020-2110",
|
|
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Jenkins project",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Jenkins Script Security Plugin",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "1.69",
|
|
"version_affected": "<="
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-265"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1713",
|
|
"url": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1713",
|
|
"refsource": "CONFIRM"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[oss-security] 20200212 Multiple vulnerabilities in Jenkins plugins",
|
|
"url": "http://www.openwall.com/lists/oss-security/2020/02/12/3"
|
|
}
|
|
]
|
|
}
|
|
} |