Sandbox Bypass Vulnerability in Jenkins Script Security Plugin
CVE-2019-10355
8.8HIGH
Summary
A vulnerability exists within the Jenkins Script Security Plugin that allows attackers to bypass the sandbox protections. Specifically, the issue lies in the handling of type casts, which can be exploited to execute arbitrary code within sandboxed scripts. Users running versions 1.61 and earlier are particularly at risk, making it crucial to update to the latest version to prevent potential exploits.
Affected Version(s)
Jenkins Script Security Plugin 1.61 and earlier
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved