Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-43404

Опубликовано: 19 окт. 2022
Источник: redhat
CVSS3: 9.9
EPSS Низкий

Описание

A sandbox bypass vulnerability involving crafted constructor bodies and calls to sandbox-generated synthetic constructors in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

A sandbox bypass vulnerability was found in several Jenkins plugins. This could allow an authenticated attacker to execute arbitrary code within the Jenkins JVM controller. Exploitation could be achieved by crafting untrusted libraries or pipelines, compromising the integrity, availability, and confidentiality of Jenkins.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsOut of support scope
OCP-Tools-4.12-RHEL-8jenkins-2-pluginsFixedRHSA-2023:106406.03.2023
OpenShift Developer Tools and Services for OCP 4.11jenkins-2-pluginsFixedRHSA-2023:319817.05.2023
Red Hat OpenShift Container Platform 4.10jenkins-2-pluginsFixedRHSA-2023:056008.02.2023
Red Hat OpenShift Container Platform 4.9jenkins-2-pluginsFixedRHSA-2023:077723.02.2023

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-693
https://bugzilla.redhat.com/show_bug.cgi?id=2136383jenkins-plugin/script-security: Sandbox bypass vulnerabilities in Jenkins Script Security Plugin

EPSS

Процентиль: 33%
0.00128
Низкий

9.9 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.9
nvd
около 3 лет назад

A sandbox bypass vulnerability involving crafted constructor bodies and calls to sandbox-generated synthetic constructors in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

CVSS3: 8.8
github
около 3 лет назад

Sandbox bypass vulnerabilities in Jenkins Script Security Plugin and in Pipeline: Groovy Plugin

EPSS

Процентиль: 33%
0.00128
Низкий

9.9 Critical

CVSS3