Sandbox Bypass Vulnerability in Jenkins Groovy Plugin
CVE-2019-1003033
8.8HIGH
Summary
A sandbox bypass vulnerability in the Jenkins Groovy Plugin permits attackers with Overall/Read permissions to execute arbitrary code on the Jenkins master JVM. This vulnerability arises from flaws in the code located in the pom.xml and StringScriptSource.java file, which can be exploited by malicious actors to execute unintended commands, compromising the security and integrity of the Jenkins instance.
Affected Version(s)
Jenkins Groovy Plugin 2.1 and earlier
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved