Sandbox Bypass Vulnerability in Jenkins Script Security Plugin by Jenkins
CVE-2019-16538

8.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
21 November 2019

Summary

A vulnerability in the Jenkins Script Security Plugin allows attackers to bypass sandbox restrictions through improper handling of default parameter expressions in closures. This flaw can enable unauthorized execution of arbitrary code within sandboxed environments, posing significant security risks to systems using affected versions of the plugin. Users are advised to upgrade to the latest version to mitigate this risk.

Affected Version(s)

Jenkins Script Security Plugin 1.67 and earlier

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.