Описание
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.
A flaw was found in the Jenkins Script Security plugin. Sandbox protection could be circumvented through default parameter expressions in constructors. This allowed attackers, able to specify and run sandboxed scripts, to execute arbitrary code in the context of the Jenkins master JVM. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat OpenShift Container Platform 3.10 | jenkins-plugin-script-security | Will not fix | ||
| Red Hat OpenShift Container Platform 3.9 | jenkins-plugin-script-security | Will not fix | ||
| Red Hat OpenShift Container Platform 3.11 | jenkins-2-plugins | Fixed | RHSA-2019:4055 | 16.12.2019 |
| Red Hat OpenShift Container Platform 4.1 | jenkins-2-plugins | Fixed | RHSA-2019:4089 | 17.12.2019 |
| Red Hat OpenShift Container Platform 4.2 | jenkins-2-plugins | Fixed | RHSA-2019:4097 | 11.12.2019 |
Показывать по
Дополнительная информация
Статус:
8.8 High
CVSS3
Связанные уязвимости
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.
Improper Control of Generation of Code in Jenkins Script Security Plugin
8.8 High
CVSS3