Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-10431

Опубликовано: 01 окт. 2019
Источник: redhat
CVSS3: 8.8

Описание

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.

A flaw was found in the Jenkins Script Security plugin. Sandbox protection could be circumvented through default parameter expressions in constructors. This allowed attackers, able to specify and run sandboxed scripts, to execute arbitrary code in the context of the Jenkins master JVM. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10jenkins-plugin-script-securityWill not fix
Red Hat OpenShift Container Platform 3.9jenkins-plugin-script-securityWill not fix
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsFixedRHSA-2019:405516.12.2019
Red Hat OpenShift Container Platform 4.1jenkins-2-pluginsFixedRHSA-2019:408917.12.2019
Red Hat OpenShift Container Platform 4.2jenkins-2-pluginsFixedRHSA-2019:409711.12.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1764390jenkins-script-security: Sandbox bypass vulnerability in Script Security Plugin

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 9.9
nvd
больше 6 лет назад

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 9.9
github
больше 3 лет назад

Improper Control of Generation of Code in Jenkins Script Security Plugin

8.8 High

CVSS3