Bug 1326403 (CVE-2016-3102) - CVE-2016-3102 jenkins: Groovy sandbox protection incomplete in Script Security Plugin (SECURITY-258)
Summary: CVE-2016-3102 jenkins: Groovy sandbox protection incomplete in Script Securit...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2016-3102
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1326407 1326408
Blocks: 1326405
TreeView+ depends on / blocked
 
Reported: 2016-04-12 15:18 UTC by Adam Mariš
Modified: 2021-02-17 04:04 UTC (History)
15 users (show)

Fixed In Version: Jenkins 1.17., Jenkins 1.18.1.
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-05-04 18:46:11 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2016-04-12 15:18:19 UTC
The following flaw was found in Jenkins:

The Script Security plugin provides a Groovy sandbox implementation to other plugins that only allows whitelisted commands to be executed. This sandbox did not cover direct field access (foo.@bar) or get/set array operations (foo[bar]).

External References:

https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-04-11

Comment 2 Adam Mariš 2016-04-12 15:21:39 UTC
Created jenkins tracking bugs for this issue:

Affects: fedora-all [bug 1326408]

Comment 3 Kurt Seifried 2016-05-04 18:46:11 UTC
These are in Jenkins plugins that do not ship with OpenShift Enterprise.

Comment 4 Fedora Update System 2016-05-17 15:13:42 UTC
jenkins-1.651.1-1.fc24, jenkins-credentials-plugin-1.27-1.fc24, jenkins-junit-plugin-1.12-1.fc24, jenkins-mailer-plugin-1.17-1.fc24, jenkins-remoting-2.57-1.fc24, jenkins-script-security-plugin-1.18.1-1.fc24, owasp-java-html-sanitizer-20160422.1-1.fc24, stapler-1.242-1.fc24, tiger-types-2.2-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.