Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-10356

Опубликовано: 01 авг. 2019
Источник: redhat
CVSS3: 8.8

Описание

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of method pointer expressions allowed attackers to execute arbitrary code in sandboxed scripts.

A flaw was found in the Jenkins Script Security plugin. Sandbox protection could be circumvented through crafted subexpressions used as arguments to method pointer expressions. This allows attackers the ability to specify sandboxed scripts to execute arbitrary code in the context of the Jenkins master JVM. The highest threats from this vulnerability are to data confidentiality and integrity as well as system availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10jenkins-script-security-pluginWill not fix
Red Hat OpenShift Container Platform 3.9jenkins-script-security-pluginWill not fix
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsFixedRHSA-2019:265104.09.2019
Red Hat OpenShift Container Platform 4.1jenkins-2-pluginsFixedRHSA-2019:266211.09.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1735518jenkins-plugin-script-security: Sandbox bypass through method pointer expressions in Script Security Plugin

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
больше 6 лет назад

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of method pointer expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 8.8
github
больше 3 лет назад

Return of Pointer Value Outside of Expected Rang in Jenkins Script Security Plugin

CVSS3: 8.8
fstec
больше 6 лет назад

Уязвимость плагина Jenkins Script Security, связанная с ошибками обработки данных, позволяющая нарушителю выполнить произвольный код

8.8 High

CVSS3