GHSA-mj9c-vjp9-pggh

Suggest an improvement
Source
https://github.com/advisories/GHSA-mj9c-vjp9-pggh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-mj9c-vjp9-pggh/GHSA-mj9c-vjp9-pggh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mj9c-vjp9-pggh
Aliases
Published
2022-05-24T16:58:51Z
Modified
2023-11-08T04:00:52.581651Z
Severity
  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Incorrect Authorization in Puppet Enterprise Pipeline Jenkins Plugin
Details

Jenkins Puppet Enterprise Pipeline 1.3.1 and earlier specifies unsafe values in its custom Script Security whitelist, allowing attackers able to execute Script Security protected scripts to execute arbitrary code.

Database specific
{
    "nvd_published_at": "2019-10-16T14:15:00Z",
    "github_reviewed_at": "2022-09-08T19:49:02Z",
    "severity": "CRITICAL",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-183",
        "CWE-863"
    ]
}
References

Affected packages

Maven / org.jenkins-ci.plugins.workflow:puppet-enterprise-pipeline

Package

Name
org.jenkins-ci.plugins.workflow:puppet-enterprise-pipeline
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins.workflow/puppet-enterprise-pipeline

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.3.1

Affected versions

1.*

1.0.1
1.1.0
1.1.1
1.2.1
1.2.2
1.2.3
1.3.0
1.3.1