-
Notifications
You must be signed in to change notification settings - Fork 285
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2024-34144 (High) detected in script-security-1229.v4880b_b_e905a_6.jar #4683
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
Comments
Closing as duplicate of #4682 |
ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory. |
@gaiksaya should this be closed? Catch All Triage - 1, 2, 3 |
Closing as duplicate of #4682 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
CVE-2024-34144 - High Severity Vulnerability
Allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.
Library home page: https://github.com/
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/script-security/1229.v4880b_b_e905a_6/6d8dfb75093b8b8973af431a5fb129a91ce87525/script-security-1229.v4880b_b_e905a_6.jar
Dependency Hierarchy:
Found in base branch: main
A sandbox bypass vulnerability involving crafted constructor bodies in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Publish Date: 2024-05-02
URL: CVE-2024-34144
Base Score Metrics:
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-34144
Release Date: 2024-05-02
Fix Resolution: org.jenkins-ci.plugins:script-security:1336.vf33a_a_9863911
The text was updated successfully, but these errors were encountered: