Sandbox Bypass Vulnerability in Jenkins Script Security Plugin by CloudBees
CVE-2019-10394
4.2MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 12 September 2019
Summary
A sandbox bypass vulnerability was discovered in the Jenkins Script Security Plugin, specifically in versions prior to 1.62. This vulnerability arises from how the plugin processes property names in property expressions on the left-hand side of assignment expressions. If exploited, attackers could execute arbitrary code within scripts running in the Jenkins sandbox environment, posing a significant security risk to affected instances. Proper remediation, including updating to the latest version, is crucial to mitigate this threat.
Affected Version(s)
Jenkins Script Security Plugin 1.62 and earlier
References
CVSS V3.1
Score:
4.2
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved