CVE-2019-1003030
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/03/2019
Last modified:
20/02/2025
Description
A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.
Impact
Base Score 3.x
9.90
Severity 3.x
CRITICAL
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:jenkins:pipeline\:_groovy:*:*:*:*:*:jenkins:*:* | 2.63 (including) | |
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/159603/Jenkins-2.63-Sandbox-Bypass.html
- http://www.securityfocus.com/bid/107476
- https://access.redhat.com/errata/RHSA-2019:0739
- https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%282%29
- http://packetstormsecurity.com/files/159603/Jenkins-2.63-Sandbox-Bypass.html
- http://www.securityfocus.com/bid/107476
- https://access.redhat.com/errata/RHSA-2019:0739
- https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%282%29