Sandbox Bypass in Jenkins Script Security Plugin Allows Arbitrary Code Execution
CVE-2019-1003005
8.8HIGH
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 6 February 2019
What is CVE-2019-1003005?
A sandbox bypass vulnerability in the Script Security Plugin for Jenkins enables attackers with Overall/Read permissions to inject and execute arbitrary Groovy scripts on the Jenkins master JVM via an HTTP endpoint. This represents a critical security risk for Jenkins servers, as unauthorized access can lead to complete control over the affected system.
Affected Version(s)
Jenkins Script Security Plugin 1.50 and earlier
References
EPSS Score
73% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved