Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7845-crfj-phc4 | Script security bypass vulnerability in Jenkins Shared Library Version Override Plugin |
Fri, 03 Oct 2025 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:jenkins:shared_library_version_override:*:*:*:*:*:jenkins:*:* |
Wed, 13 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins
Jenkins shared Library Version Override |
|
| Weaknesses | CWE-862 | |
| CPEs | cpe:2.3:a:jenkins:shared_library_version_override:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Jenkins
Jenkins shared Library Version Override |
|
| Metrics |
cvssV3_1
|
Wed, 13 Nov 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jenkins Shared Library Version Override Plugin 17.v786074c9fce7 and earlier declares folder-scoped library overrides as trusted, so that they're not executed in the Script Security sandbox, allowing attackers with Item/Configure permission on a folder to configure a folder-scoped library override that runs without sandbox protection. | |
| References |
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-11-13T21:36:03.550Z
Reserved: 2024-11-12T15:28:28.980Z
Link: CVE-2024-52554
Updated: 2024-11-13T21:31:27.091Z
Status : Analyzed
Published: 2024-11-13T21:15:29.540
Modified: 2025-10-03T00:56:06.223
Link: CVE-2024-52554
No data.
OpenCVE Enrichment
No data.
Github GHSA