Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-1003030

Опубликовано: 06 мар. 2019
Источник: redhat
CVSS3: 8.8
EPSS Критический

Описание

A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.

A flaw was found in the Jenkins Workflow CPS plugin. Parsing, compilation, and script instantiations provided by a crafted Groovy script could escape the sandbox allowing users to execute arbitrary code on the Jenkins master. The highest risk from this vulnerability is to data confidentiality and integrity as well as system availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10jenkins-2-pluginsWill not fix
Red Hat OpenShift Container Platform 3.4jenkins-plugin-workflow-cpsWill not fix
Red Hat OpenShift Container Platform 3.5jenkins-plugin-workflow-cpsWill not fix
Red Hat OpenShift Container Platform 3.6jenkins-2-pluginsWill not fix
Red Hat OpenShift Container Platform 3.7jenkins-2-pluginsWill not fix
Red Hat OpenShift Container Platform 3.9jenkins-2-pluginsWill not fix
Red Hat OpenShift Container Platform 4jenkins-2-pluginsNot affected
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsFixedRHSA-2019:073910.04.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1690665jenkins-plugin-workflow-cps: Sandbox bypass in Pipeline: Groovy Plugin (SECURITY-1336(2))

EPSS

Процентиль: 100%
0.93052
Критический

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 9.9
nvd
почти 7 лет назад

A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.

CVSS3: 9.9
github
больше 3 лет назад

Sandbox bypass in Jenkins Pipeline: Groovy Plugin

CVSS3: 9.9
fstec
почти 7 лет назад

Уязвимость компонентов pom.xml и CpsGroovyShell.java плагина Jenkins Pipeline, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.93052
Критический

8.8 High

CVSS3