CVE-2019-1003029
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/03/2019
Last modified:
24/10/2025
Description
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM.
Impact
Base Score 3.x
9.90
Severity 3.x
CRITICAL
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:* | 1.53 (including) | |
| cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html
- http://www.securityfocus.com/bid/107476
- https://access.redhat.com/errata/RHSA-2019:0739
- https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%281%29
- http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html
- http://www.securityfocus.com/bid/107476
- https://access.redhat.com/errata/RHSA-2019:0739
- https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%281%29
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-1003029



