Vulnerability CVE-2019-10390


Published: 2019-08-28

Description:
A sandbox bypass vulnerability in Jenkins Splunk Plugin 1.7.4 and earlier allowed attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Jenkins -> Splunk 

 References:
http://www.openwall.com/lists/oss-security/2019/08/28/4
https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1294

Copyright 2024, cxsecurity.com

 

Back to Top