Логотип exploitDog
bind:CVE-2019-1003034
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1003034

Количество 4

Количество 4

redhat логотип

CVE-2019-1003034

почти 7 лет назад

A sandbox bypass vulnerability exists in Jenkins Job DSL Plugin 1.71 and earlier in job-dsl-core/src/main/groovy/javaposse/jobdsl/dsl/AbstractDslScriptLoader.groovy, job-dsl-plugin/build.gradle, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/JobDslWhitelist.groovy, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/SandboxDslScriptLoader.groovy that allows attackers with control over Job DSL definitions to execute arbitrary code on the Jenkins master JVM.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2019-1003034

почти 7 лет назад

A sandbox bypass vulnerability exists in Jenkins Job DSL Plugin 1.71 and earlier in job-dsl-core/src/main/groovy/javaposse/jobdsl/dsl/AbstractDslScriptLoader.groovy, job-dsl-plugin/build.gradle, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/JobDslWhitelist.groovy, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/SandboxDslScriptLoader.groovy that allows attackers with control over Job DSL definitions to execute arbitrary code on the Jenkins master JVM.

CVSS3: 9.9
EPSS: Низкий
github логотип

GHSA-5r74-pgmq-92mm

больше 3 лет назад

Script security sandbox bypass in Jenkins Job DSL Plugin

CVSS3: 9.9
EPSS: Низкий
fstec логотип

BDU:2019-02073

почти 7 лет назад

Уязвимость компонентов AbstractDslScriptLoader.groovy, JobDslWhitelist.groovy, SandboxDslScriptLoader.groovy плагина Jenkins Job DSL, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2019-1003034

A sandbox bypass vulnerability exists in Jenkins Job DSL Plugin 1.71 and earlier in job-dsl-core/src/main/groovy/javaposse/jobdsl/dsl/AbstractDslScriptLoader.groovy, job-dsl-plugin/build.gradle, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/JobDslWhitelist.groovy, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/SandboxDslScriptLoader.groovy that allows attackers with control over Job DSL definitions to execute arbitrary code on the Jenkins master JVM.

CVSS3: 8.8
2%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-1003034

A sandbox bypass vulnerability exists in Jenkins Job DSL Plugin 1.71 and earlier in job-dsl-core/src/main/groovy/javaposse/jobdsl/dsl/AbstractDslScriptLoader.groovy, job-dsl-plugin/build.gradle, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/JobDslWhitelist.groovy, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/SandboxDslScriptLoader.groovy that allows attackers with control over Job DSL definitions to execute arbitrary code on the Jenkins master JVM.

CVSS3: 9.9
2%
Низкий
почти 7 лет назад
github логотип
GHSA-5r74-pgmq-92mm

Script security sandbox bypass in Jenkins Job DSL Plugin

CVSS3: 9.9
2%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-02073

Уязвимость компонентов AbstractDslScriptLoader.groovy, JobDslWhitelist.groovy, SandboxDslScriptLoader.groovy плагина Jenkins Job DSL, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.9
2%
Низкий
почти 7 лет назад

Уязвимостей на страницу