Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-1003024

Опубликовано: 20 фев. 2019
Источник: debian
EPSS Низкий

Описание

A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jenkinsremovedpackage

EPSS

Процентиль: 53%
0.00302
Низкий

Связанные уязвимости

CVSS3: 8.8
redhat
почти 7 лет назад

A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

CVSS3: 8.8
nvd
почти 7 лет назад

A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

CVSS3: 8.8
github
больше 3 лет назад

Jenkins Script Security Plugin sandbox bypass vulnerability

CVSS3: 8.8
fstec
почти 7 лет назад

Уязвимость компонента RejectASTTransformsCustomizer.java плагина Jenkins Script Security, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 53%
0.00302
Низкий