Sandbox Bypass Affecting org.jenkins-ci.plugins:simple-travis-runner package, versions [0,]


0.0
high

Snyk CVSS

    Attack Complexity Low
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    EPSS 0.12% (47th percentile)
Expand this section
NVD
8.8 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGJENKINSCIPLUGINS-458750
  • published 8 Aug 2019
  • disclosed 7 Aug 2019
  • credit Jesse Glick

How to fix?

There is no fixed version for org.jenkins-ci.plugins:simple-travis-runner.

Overview

org.jenkins-ci.plugins:simple-travis-runner is an a Jenkins Pipeline step to convert simple Travis YAML to Pipeline on the fly.

Affected versions of this package are vulnerable to Sandbox Bypass. The plugin specifies unsafe values in its custom Script Security whitelist, allowing attackers able to execute Script Security protected scripts to execute arbitrary code.