Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-16538

Опубликовано: 21 нояб. 2019
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.67 and earlier related to the handling of default parameter expressions in closures allowed attackers to execute arbitrary code in sandboxed scripts.

A sandbox bypass flaw was found in the Jenkins Script Security Plugin versions 1.67 and earlier, that are related to the handling of closure default parameter expressions. This flaw allows attackers to execute arbitrary code in sandboxed scripts.

Дополнительная информация

Статус:

Important
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=1819652jenkins-script-security-plugin: sandbox protection bypass leads to execute arbitrary code in sandboxed scripts

EPSS

Процентиль: 39%
0.00176
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
около 6 лет назад

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.67 and earlier related to the handling of default parameter expressions in closures allowed attackers to execute arbitrary code in sandboxed scripts.

CVSS3: 8.8
github
больше 3 лет назад

Incorrect Authorization in Jenkins Script Security Plugin

EPSS

Процентиль: 39%
0.00176
Низкий

8.8 High

CVSS3