Sandbox Bypass Vulnerability in Jenkins Script Security Plugin
CVE-2019-10393

4.2MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 September 2019

Summary

A sandbox bypass vulnerability exists in the Jenkins Script Security Plugin version 1.62 and earlier. This flaw is linked to how method names are managed within method call expressions. By exploiting this vulnerability, attackers can execute arbitrary code in scripts that are supposed to be contained within a sandbox, potentially leading to unauthorized actions within the Jenkins environment. Proper measures should be taken to secure and update affected versions to mitigate the risk associated with this vulnerability.

Affected Version(s)

Jenkins Script Security Plugin 1.62 and earlier

References

CVSS V3.1

Score:
4.2
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.