CVE-2017-1000095

MEDIUM

Groovy - Info Disclosure

Title source: llm
STIX 2.1

Description

The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['rawBuild'] rather than currentBuild.rawBuild. Additionally, the following entries allowed accessing private data that would not be accessible otherwise due to script security: groovy.json.JsonOutput.toJson(Closure); groovy.json.JsonOutput.toJson(Object).

References (1)

Core 1
Core References
Vendor Advisory x_refsource_confirm
https://jenkins.io/security/advisory/2017-07-10/

Scores

CVSS v3 6.5
EPSS 0.0007
EPSS Percentile 20.2%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-732
Status published
Products (2)
jenkins/script_security 1.34
org.jenkins-ci.plugins/script-security 0 - 1.29.1Maven
Published Oct 05, 2017
Tracked Since Feb 18, 2026