Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-1003000

Опубликовано: 08 янв. 2019
Источник: redhat
CVSS3: 8.8

Описание

A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java that allows attackers with the ability to provide sandboxed scripts to execute arbitrary code on the Jenkins master JVM.

A flaw was found in Jenkins Pipeline. The Script Security sandbox protection could be circumvented during the script compilation phase by applying AST, transforming annotations such as @Grab to source code elements. Both the pipeline validation REST APIs and actual script/pipeline execution are affected. This allowed users with Overall/Read permission, or able to control Jenkinsfile or sandboxed Pipeline shared library contents in SCM, to bypass the sandbox protection and execute arbitrary code on the Jenkins master. All known unsafe AST transformations in Groovy are now prohibited in sandboxed scripts. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10jenkins-plugin-script-securityAffected
Red Hat OpenShift Container Platform 3.2jenkins-plugin-script-securityOut of support scope
Red Hat OpenShift Container Platform 3.3jenkins-plugin-script-securityOut of support scope
Red Hat OpenShift Container Platform 3.4jenkins-plugin-script-securityAffected
Red Hat OpenShift Container Platform 3.5jenkins-plugin-script-securityAffected
Red Hat OpenShift Container Platform 3.6jenkins-plugin-script-securityAffected
Red Hat OpenShift Container Platform 3.7jenkins-plugin-script-securityAffected
Red Hat OpenShift Container Platform 3.9jenkins-plugin-script-securityAffected
Red Hat OpenShift Container Platform 4jenkins-2-pluginsNot affected
Red Hat OpenShift Container Platform 3.11atomic-enterprise-service-catalogFixedRHBA-2019:032620.02.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-96
https://bugzilla.redhat.com/show_bug.cgi?id=1667566jenkins-plugin-script-security: Sandbox Bypass in Script Security Plugin

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
около 7 лет назад

A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java that allows attackers with the ability to provide sandboxed scripts to execute arbitrary code on the Jenkins master JVM.

CVSS3: 8.8
github
больше 3 лет назад

Protection Mechanism Failure in Jenkins Script Security Plugin

8.8 High

CVSS3