Arbitrary Code Execution

Affecting org.jenkins-ci.plugins:liquibase-runner artifact, versions [0,]

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

org.jenkins-ci.plugins:liquibase-runner Adds liquibase changeset evaluation as an available build step.

Affected versions of this package are vulnerable to Arbitrary Code Execution. It allows an attacker with permission to configure jobs to load and execute arbitrary code on the Jenkins master JVM.

Remediation

There is no fix version for org.jenkins-ci.plugins:liquibase-runner.

References

CVSS Score

8.8
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    Low
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Credit
Unknown
CVE
CVE-2018-1000146
CWE
CWE-94
Snyk ID
SNYK-JAVA-ORGJENKINSCIPLUGINS-32213
Disclosed
26 Mar, 2018
Published
15 Apr, 2018