Sandbox Bypass in Jenkins Script Security Plugin Allows Arbitrary Code Execution
CVE-2019-1003005

8.8HIGH

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
6 February 2019

What is CVE-2019-1003005?

A sandbox bypass vulnerability in the Script Security Plugin for Jenkins enables attackers with Overall/Read permissions to inject and execute arbitrary Groovy scripts on the Jenkins master JVM via an HTTP endpoint. This represents a critical security risk for Jenkins servers, as unauthorized access can lead to complete control over the affected system.

Affected Version(s)

Jenkins Script Security Plugin 1.50 and earlier

References

EPSS Score

73% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2019-1003005 : Sandbox Bypass in Jenkins Script Security Plugin Allows Arbitrary Code Execution