René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.8 KiB
JSON

{
"id": "CVE-2018-1000058",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-02-09T23:29:02.120",
"lastModified": "2018-03-06T15:56:27.573",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jenkins Pipeline: Supporting APIs Plugin 2.17 and earlier have an arbitrary code execution due to incomplete sandbox protection: Methods related to Java deserialization like readResolve implemented in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles."
},
{
"lang": "es",
"value": "Jenkins Pipeline: Supporting APIs Plugin, en versiones 2.17 y anteriores, tiene una ejecuci\u00f3n de c\u00f3digo arbitrario debido a una protecci\u00f3n del sandbox incompleta. Los m\u00e9todos relacionados con la deserializaci\u00f3n Java, como readResolve implementado en los scripts de Pipeline, no estaban sometidos a mecanismos de protecci\u00f3n de sandboxes y podr\u00edan ejecutar c\u00f3digo arbitrario en consecuencia. Por ejemplo, se podr\u00eda explotar con usuarios normales de Jenkins con el permiso para configurar Pipelines en Jenkins o con committers de confianza en repositorios que contengan Jenkinsfiles."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:pipeline_supporting_apis:*:*:*:*:*:jenkins:*:*",
"versionEndIncluding": "2.17",
"matchCriteriaId": "63174EDA-483C-497D-8359-A88A41DF5AFE"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/103034",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://jenkins.io/security/advisory/2018-02-05/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}