Sandbox Bypass Vulnerability in Jenkins Groovy Plugin
CVE-2019-1003033

8.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
8 March 2019

Summary

A sandbox bypass vulnerability in the Jenkins Groovy Plugin permits attackers with Overall/Read permissions to execute arbitrary code on the Jenkins master JVM. This vulnerability arises from flaws in the code located in the pom.xml and StringScriptSource.java file, which can be exploited by malicious actors to execute unintended commands, compromising the security and integrity of the Jenkins instance.

Affected Version(s)

Jenkins Groovy Plugin 2.1 and earlier

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.