CVE-2017-2650: Jenkins Pipeline Classpath Step plugin allowed Script Security sandbox bypass
8.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.31936%
CWE
-
Published
5/13/2022
Updated
1/30/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| cprice404:pipeline-classpath | maven | = 0.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the classpath step functionality that enables adding classpath entries during pipeline execution. Since the advisory specifically mentions this plugin enables sandbox bypass, the core function responsible for processing classpath additions (ClasspathStepExecution.run) would be the entry point that fails to properly validate/restrict classpath sources. This would allow users with SCM commit access to load unapproved libraries containing unsafe methods that escape the Groovy sandbox. The high confidence comes from the direct correlation between the plugin's purpose (classpath manipulation) and the described sandbox bypass mechanism.