Vulnerability CVE-2019-1003030


Published: 2019-03-08   Modified: 2019-03-09

Description:
A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Jenkins 2.63 Sandbox Bypass
dmw0ng
19.10.2020

Type:

CWE-254

(Security Features)

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Jenkins -> Pipeline 

 References:
http://www.securityfocus.com/bid/107476
https://access.redhat.com/errata/RHSA-2019:0739
https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20(2
)

Copyright 2024, cxsecurity.com

 

Back to Top