CVE: CVE-2017-1000095

Export to Word

The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['rawBuild'] rather than currentBuild.rawBuild. Additionally, the following entries allowed accessing private data that would not be accessible otherwise due to script security: groovy.json.JsonOutput.toJson(Closure); groovy.json.JsonOutput.toJson(Object).

Threat-Mapped Scoring

Score: 0.0

Priority: Unclassified

EPSS

Score: 0.00066
Percentile: 0.20916

CVSS Scoring

CVSS v3.0 Score: 6.5

Severity: MEDIUM

Mapped CWE(s)

All CAPEC(s)

CAPEC(s) with Mapped TTPs

Mapped ATT&CK TTPs

Malware

APTs Threat Group Associations

Campaigns

Affected Products

← Back to Home