Sandbox Bypass in Jenkins Script Security Plugin Allows Arbitrary Code Execution
CVE-2019-1003005

8.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
6 February 2019

Summary

A sandbox bypass vulnerability in the Script Security Plugin for Jenkins enables attackers with Overall/Read permissions to inject and execute arbitrary Groovy scripts on the Jenkins master JVM via an HTTP endpoint. This represents a critical security risk for Jenkins servers, as unauthorized access can lead to complete control over the affected system.

Affected Version(s)

Jenkins Script Security Plugin 1.50 and earlier

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.