logo

CVE-2019-10399 org.jenkins-ci.plugins:script-security

Package

Manager: maven
Name: org.jenkins-ci.plugins:script-security
Vulnerable Version: >=0 <1.63

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00221 pctl0.44656

Details

Sandbox bypass vulnerability in Jenkins Script Security Plugin A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.

Metadata

Created: 2022-05-24T16:55:59Z
Modified: 2023-12-14T15:52:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-m26f-w3h5-62fj/GHSA-m26f-w3h5-62fj.json
CWE IDs: []
Alternative ID: GHSA-m26f-w3h5-62fj
Finding: F422
Auto approve: 1