Описание
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of method pointer expressions allowed attackers to execute arbitrary code in sandboxed scripts.
A flaw was found in the Jenkins Script Security plugin. Sandbox protection could be circumvented through crafted subexpressions used as arguments to method pointer expressions. This allows attackers the ability to specify sandboxed scripts to execute arbitrary code in the context of the Jenkins master JVM. The highest threats from this vulnerability are to data confidentiality and integrity as well as system availability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat OpenShift Container Platform 3.10 | jenkins-script-security-plugin | Will not fix | ||
| Red Hat OpenShift Container Platform 3.9 | jenkins-script-security-plugin | Will not fix | ||
| Red Hat OpenShift Container Platform 3.11 | jenkins-2-plugins | Fixed | RHSA-2019:2651 | 04.09.2019 |
| Red Hat OpenShift Container Platform 4.1 | jenkins-2-plugins | Fixed | RHSA-2019:2662 | 11.09.2019 |
Показывать по
Дополнительная информация
Статус:
8.8 High
CVSS3
Связанные уязвимости
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of method pointer expressions allowed attackers to execute arbitrary code in sandboxed scripts.
Return of Pointer Value Outside of Expected Rang in Jenkins Script Security Plugin
Уязвимость плагина Jenkins Script Security, связанная с ошибками обработки данных, позволяющая нарушителю выполнить произвольный код
8.8 High
CVSS3