Sandbox Bypass Vulnerability in Jenkins Script Security Plugin by CloudBees
CVE-2019-10399

4.2MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 September 2019

Summary

A sandbox bypass vulnerability exists in the Jenkins Script Security Plugin versions 1.62 and earlier, due to improper handling of property names within property expressions related to increment and decrement operations. This flaw may allow an attacker to execute arbitrary code in scripts that are expected to run in a restricted sandboxed environment, possibly compromising system integrity.

Affected Version(s)

Jenkins Script Security Plugin 1.62 and earlier

References

CVSS V3.1

Score:
4.2
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.