Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[🐸 Frogbot] Update version of org.jenkins-ci.plugins.workflow:workflow-cps to [2648.2651.v230593e03e9f] #865

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

github-actions[bot]
Copy link

📦 Vulnerable Dependencies

✍️ Summary

SEVERITY CONTEXTUAL ANALYSIS DIRECT DEPENDENCIES IMPACTED DEPENDENCY FIXED VERSIONS

Critical
Undetermined org.jenkins-ci.plugins.workflow:workflow-cps:2.61.1 org.jenkins-ci.plugins.workflow:workflow-cps:2.61.1 [2648.2651.v230593e03e9f]

👇 Details

  • Severity 💀 Critical
  • Contextual Analysis: Undetermined
  • Package Name: org.jenkins-ci.plugins.workflow:workflow-cps
  • Current Version: 2.61.1
  • Fixed Version: [2648.2651.v230593e03e9f]
  • CVE: CVE-2022-43404

Description:

A sandbox bypass vulnerability involving crafted constructor bodies and calls to sandbox-generated synthetic constructors in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.


@eyalbe4 eyalbe4 added the safe to test Approve running integration tests on a pull request label Aug 12, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
safe to test Approve running integration tests on a pull request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants