CVE-2019-1003034: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
(updated )
A sandbox bypass vulnerability exists in Jenkins Job DSL Plugin 1.71 and earlier in job-dsl-core/src/main/groovy/javaposse/jobdsl/dsl/AbstractDslScriptLoader.groovy
, job-dsl-plugin/build.gradle
, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/JobDslallow
list.groovy
, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/SandboxDslScriptLoader.groovy
that allows attackers with control over Job DSL definitions to execute arbitrary code on the Jenkins master JVM.
References
Detect and mitigate CVE-2019-1003034 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →