Описание
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of type casts allowed attackers to execute arbitrary code in sandboxed scripts.
A flaw was found in Jenkins Script Security plugin. Sandbox protection could be circumvented by casting crafted objects to other types allowing an attacker to specify sandboxed scripts to invoke constructors that weren't previously whitelisted. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat OpenShift Container Platform 3.10 | jenkins-script-security-plugin | Will not fix | ||
| Red Hat OpenShift Container Platform 3.9 | jenkins-script-security-plugin | Will not fix | ||
| Red Hat OpenShift Container Platform 3.11 | jenkins-2-plugins | Fixed | RHSA-2019:2651 | 04.09.2019 |
| Red Hat OpenShift Container Platform 4.1 | jenkins-2-plugins | Fixed | RHSA-2019:2662 | 11.09.2019 |
Показывать по
Дополнительная информация
Статус:
EPSS
8.8 High
CVSS3
Связанные уязвимости
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of type casts allowed attackers to execute arbitrary code in sandboxed scripts.
Incorrect Privilege Assignment in Jenkins Script Security Plugin
Уязвимость плагина Jenkins Script Security, связанная с неправильным преобразованием типов, позволяющая нарушителю выполнить произвольный код или получить несанкционированный доступ к конфиденциальной информации
EPSS
8.8 High
CVSS3