Skip to content

Commit 1c0d0f1

Browse files
1 parent 1309e82 commit 1c0d0f1

File tree

2 files changed

+102
-2
lines changed

2 files changed

+102
-2
lines changed

advisories/github-reviewed/2022/05/GHSA-qvhf-3567-pc4v/GHSA-qvhf-3567-pc4v.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qvhf-3567-pc4v",
4-
"modified": "2023-01-05T20:11:47Z",
4+
"modified": "2025-06-19T14:41:34Z",
55
"published": "2022-05-24T17:10:27Z",
66
"aliases": [
77
"CVE-2020-2135"
88
],
99
"summary": "Sandbox bypass vulnerability in Script Security Plugin",
10-
"details": "Sandbox protection in Script Security Plugin 1.70 and earlier can be circumvented through:\\n- Crafted constructor calls and bodies (due to an incomplete fix of [SECURITY-582](https://www.jenkins.io/security/advisory/2017-08-07/#super-constructor-calls))\n- Crafted method calls on objects that implement `GroovyInterceptable`\n\nThis allows attackers able to specify and run sandboxed scripts to execute arbitrary code in the context of the Jenkins controller JVM.\n\nScript Security Plugin 1.71 has additional restrictions and sanity checks to ensure that super constructors cannot be constructed without being intercepted by the sandbox. In addition, it also intercepts method calls on objects that implement `GroovyInterceptable` as calls to `GroovyObject#invokeMethod(String, Object)`, which is on the list of dangerous signatures and should not be approved for use in the sandbox.",
10+
"details": "Sandbox protection in Script Security Plugin 1.70 and earlier can be circumvented through:\n- Crafted constructor calls and bodies (due to an incomplete fix of [SECURITY-582](https://www.jenkins.io/security/advisory/2017-08-07/#super-constructor-calls))\n- Crafted method calls on objects that implement `GroovyInterceptable`\n\nThis allows attackers able to specify and run sandboxed scripts to execute arbitrary code in the context of the Jenkins controller JVM.\n\nScript Security Plugin 1.71 has additional restrictions and sanity checks to ensure that super constructors cannot be constructed without being intercepted by the sandbox. In addition, it also intercepts method calls on objects that implement `GroovyInterceptable` as calls to `GroovyObject#invokeMethod(String, Object)`, which is on the list of dangerous signatures and should not be approved for use in the sandbox.",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
Lines changed: 100 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,100 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6q65-j4jw-9cg8",
4+
"modified": "2025-06-19T14:40:30Z",
5+
"published": "2025-06-19T14:40:30Z",
6+
"aliases": [],
7+
"summary": "DotVVM allows path traversal when deployed in Debug mode",
8+
"details": "### Description\n\nThere is a path traversal vulnerability in any DotVVM application started in Debug mode, if at least one resource with the `FileResourceLocation` has been added. The vulnerability allows an attacker to read arbitrary files from the filesystem accessible by the web application (i.e. appsettings.json or other files containing secrets).\n\n### Patches\n\nThe bug is patched in versions **4.2.10**, **4.3.8** and **5.0.0-preview03-final** (and newer).\n\nApart from updating DotVVM, it is also recommend invalidating any secrets which could have been leaked by an application deployed in Debug mode (such as database passwords).\n\n### Workarounds\n\nIf you cannot update to a patched version, avoid running a publicly accessible DotVVM application in Debug mode (Development environment in Asp.Net Core). It is recommend adding the following statement to the DotvvmStartup class:\n\n```\n config.Debug = false; // TODO: workaround for GHSA-6q65-j4jw-9cg8, remove after updating DotVVM\n```",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "NuGet",
19+
"name": "DotVVM"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "4.3.0-preview01-final"
27+
},
28+
{
29+
"fixed": "4.3.8"
30+
}
31+
]
32+
}
33+
],
34+
"database_specific": {
35+
"last_known_affected_version_range": "<= 4.3.7"
36+
}
37+
},
38+
{
39+
"package": {
40+
"ecosystem": "NuGet",
41+
"name": "DotVVM"
42+
},
43+
"ranges": [
44+
{
45+
"type": "ECOSYSTEM",
46+
"events": [
47+
{
48+
"introduced": "5.0.0-preview01-final"
49+
},
50+
{
51+
"fixed": "5.0.0-preview03-final"
52+
}
53+
]
54+
}
55+
]
56+
},
57+
{
58+
"package": {
59+
"ecosystem": "NuGet",
60+
"name": "DotVVM"
61+
},
62+
"ranges": [
63+
{
64+
"type": "ECOSYSTEM",
65+
"events": [
66+
{
67+
"introduced": "0"
68+
},
69+
{
70+
"fixed": "4.2.10"
71+
}
72+
]
73+
}
74+
]
75+
}
76+
],
77+
"references": [
78+
{
79+
"type": "WEB",
80+
"url": "https://github.com/riganti/dotvvm/security/advisories/GHSA-6q65-j4jw-9cg8"
81+
},
82+
{
83+
"type": "WEB",
84+
"url": "https://github.com/riganti/dotvvm/commit/68db0110beeda4e8e4be1b7c4e480ef876895bb5"
85+
},
86+
{
87+
"type": "PACKAGE",
88+
"url": "https://github.com/riganti/dotvvm"
89+
}
90+
],
91+
"database_specific": {
92+
"cwe_ids": [
93+
"CWE-22"
94+
],
95+
"severity": "HIGH",
96+
"github_reviewed": true,
97+
"github_reviewed_at": "2025-06-19T14:40:30Z",
98+
"nvd_published_at": null
99+
}
100+
}

0 commit comments

Comments
 (0)