Jenkins Pipeline Groovy Plugin Vulnerability Affecting Default Parameter Expressions
CVE-2020-2109
8.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 12 February 2020
Summary
The Jenkins Pipeline: Groovy Plugin, specifically versions 2.78 and earlier, is subject to a vulnerability that allows attackers to bypass sandbox protection via default parameter expressions in CPS-transformed methods. This weakness could enable unauthorized code execution in the Jenkins environment, posing a significant risk to continuous integration and delivery processes. It is crucial for users to review their usage of this plugin and apply necessary updates to mitigate potential threats.
Affected Version(s)
Jenkins Pipeline: Groovy Plugin <= 2.78
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved