CVE-2019-1003029: Sandbox bypass in Script Security Plugin
(updated )
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM.
References
- access.redhat.com/errata/RHSA-2019:0739
- github.com/advisories/GHSA-xvxq-hq48-xphm
- github.com/jenkinsci/script-security-plugin
- jenkins.io/security/advisory/2019-03-06/
- jenkins.io/security/advisory/2019-03-06/
- nvd.nist.gov/vuln/detail/CVE-2019-1003029
- www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-1003029
Code Behaviors & Features
Detect and mitigate CVE-2019-1003029 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →