Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-1000505

EPSS 0.32% · P55
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-1000505

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
CloudBees Jenkins Script Security插件安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
CloudBees Jenkins CI(前称Hudson Labs)是美国CloudBees公司的一套基于Java开发的持续集成工具,它主要用于监控持续的软件版本发布/测试项目和一些定时执行的任务。Script Security plugin是其中的一个用于检测脚本安全性的插件。 CloudBees Jenkins Script Security插件1.36及之前的版本中存在安全漏洞。攻击者可利用该漏洞在Jenkins master文件系统上读取任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2017-1000505

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-1000505

登录查看更多情报信息。

Same Patch Batch · n/a · 2018-01-25 · 33 CVEs total

CVE-2018-5967Netis WF2419 跨站脚本漏洞
CVE-2016-10710Biscom Secure File Transfer 安全漏洞
CVE-2018-6315libming 数字错误漏洞
CVE-2018-6313WBCE CMS 跨站脚本漏洞
CVE-2018-5447Nari PCS-9611 relay 输入验证漏洞
CVE-2018-5997RAVPower Filehub HTTP Server 路径遍历漏洞
CVE-2018-5973E.I Hi-Tech Professional Local Directory Script SQL注入漏洞
CVE-2018-5965CMS Made Simple 跨站脚本漏洞
CVE-2018-5964CMS Made Simple 安全漏洞
CVE-2018-5963CMS Made Simple 安全漏洞
CVE-2018-5954phpFreeChat 安全漏洞
CVE-2018-5748Red Hat libvirt 资源管理错误漏洞
CVE-2017-15365MariaDB和Percona XtraDB Cluster 安全漏洞
CVE-2017-1000414ImpulseAdventure JPEGsnoop 数字错误漏洞
CVE-2018-6308SugarCRM Community Edition SQL注入漏洞
CVE-2018-6217Kingsoft WPS Office 安全漏洞
CVE-2017-15546EMC RSA Authentication Manager Security Console SQL注入漏洞
CVE-2018-6209Max Secure Anti Virus 安全漏洞
CVE-2018-6208Max Secure Anti Virus 安全漏洞
CVE-2018-6207Max Secure Anti Virus 安全漏洞

Showing top 20 of 33 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-1000505

No comments yet


Leave a comment