CVE-2017-1000107: Sandbox bypass in Jenkins Script Security Plugin sandbox bypass
8.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50561%
CWE
-
Published
5/13/2022
Updated
1/30/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:script-security | maven | <= 1.30 | 1.31 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing sandbox checks for specific Groovy language constructs. The advisory explicitly identifies four bypass vectors: method references, positional constructor args, type coercion, and super constructor calls. Each corresponds to a security ticket (SECURITY-566/567/580/582) and specific AST processing functions
in the Script Security Plugin
. The functions
listed are core sandbox enforcement points that lacked necessary validation
in vulnerable versions, as evidenced by the patch notes requiring added restrictions for these expression types. Runtime exploitation would trigger these functions
during malicious Groovy script evaluation.