Sandbox Bypass in Jenkins Script Security Plugin Allows Arbitrary Code Execution
CVE-2019-1003005
8.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 6 February 2019
Summary
A sandbox bypass vulnerability in the Script Security Plugin for Jenkins enables attackers with Overall/Read permissions to inject and execute arbitrary Groovy scripts on the Jenkins master JVM via an HTTP endpoint. This represents a critical security risk for Jenkins servers, as unauthorized access can lead to complete control over the affected system.
Affected Version(s)
Jenkins Script Security Plugin 1.50 and earlier
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved