Jenkins Matrix Project Plugin 822.v01b_8c85d16d2 and earlier does not sanitize user-defined axis names of multi-configuration projects, allowing attackers with Item/Configure permission to create or replace any config.xml files on the Jenkins controller file system with content not controllable by the attackers. Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system. As a workaround, if you are using the OCI archive as input into stereoscope then you can switch to using an OCI layout by unarchiving the tar archive and provide the unarchived directory to stereoscope. Specifically, use of `/anchore/stereoscope/pkg/file.UntarToDirectory()` function, the `/anchore/stereoscope/pkg/image/oci.TarballImageProvider` struct, or the higher level `/anchore/stereoscope/pkg/()` function express this vulnerability. Prior to version 0.0.1, it is possible to craft an OCI tar archive that, when stereoscope attempts to unarchive the contents, will result in writing to paths outside of the unarchive temporary directory. Stereoscope is a go library for processing container images and simulating a squash filesystem.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |