The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['rawBuild'] rather than currentBuild.rawBuild. Additionally, the following entries allowed accessing private data that would not be accessible otherwise due to script security: groovy.json.JsonOutput.toJson(Closure); groovy.json.JsonOutput.toJson(Object).
{ "nvd_published_at": "2017-10-05T01:29:00Z", "cwe_ids": [ "CWE-732" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-01-30T22:46:07Z" }