Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-1003002

Опубликовано: 08 янв. 2019
Источник: redhat
CVSS3: 8.8
EPSS Критический

Описание

A sandbox bypass vulnerability exists in Pipeline: Declarative Plugin 1.3.3 and earlier in pipeline-model-definition/src/main/groovy/org/jenkinsci/plugins/pipeline/modeldefinition/parser/Converter.groovy that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

A flaw was found in Jenkins Pipeline. Script Security sandbox protection could be circumvented during the script compilation phase by applying AST transforming annotations such as @Grab to source code elements. This allows users with Overall/Read permission, or able to control Jenkinsfile or sandboxed Pipeline shared library contents in SCM, to bypass the sandbox protection and execute arbitrary code on the Jenkins master. All known unsafe AST transformations in Groovy are now prohibited in sandboxed scripts. Both the pipeline validation REST APIs and actual script/pipeline execution are affected. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10jenkins-plugin-pipeline-model-definitionAffected
Red Hat OpenShift Container Platform 3.2jenkins-plugin-pipeline-model-definitionNot affected
Red Hat OpenShift Container Platform 3.3jenkins-plugin-pipeline-model-definitionNot affected
Red Hat OpenShift Container Platform 3.4jenkins-plugin-pipeline-model-definitionNot affected
Red Hat OpenShift Container Platform 3.5jenkins-plugin-pipeline-model-definitionOut of support scope
Red Hat OpenShift Container Platform 3.6jenkins-plugin-pipeline-model-definitionAffected
Red Hat OpenShift Container Platform 3.7jenkins-plugin-pipeline-model-definitionAffected
Red Hat OpenShift Container Platform 3.9jenkins-plugin-pipeline-model-definitionAffected
Red Hat OpenShift Container Platform 4jenkins-2-pluginsNot affected
Red Hat OpenShift Container Platform 3.11atomic-enterprise-service-catalogFixedRHBA-2019:032620.02.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-96
https://bugzilla.redhat.com/show_bug.cgi?id=1669508jenkins-plugin-pipeline-model-definition: Sandbox Bypass in Pipeline: Declarative

EPSS

Процентиль: 100%
0.93454
Критический

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
около 7 лет назад

A sandbox bypass vulnerability exists in Pipeline: Declarative Plugin 1.3.3 and earlier in pipeline-model-definition/src/main/groovy/org/jenkinsci/plugins/pipeline/modeldefinition/parser/Converter.groovy that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

CVSS3: 8.8
github
больше 3 лет назад

Jenkins Pipeline Declarative Plugin sandbox bypass vulnerability

EPSS

Процентиль: 100%
0.93454
Критический

8.8 High

CVSS3