CVE-2019-10431 – org.jenkins-ci.plugins:script-security
Package
Manager: maven
Name: org.jenkins-ci.plugins:script-security
Vulnerable Version: >=0 <1.65
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.00407 pctl0.60353
Details
Improper Control of Generation of Code in Jenkins Script Security Plugin A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.
Metadata
Created: 2022-05-24T16:57:28Z
Modified: 2023-10-26T18:53:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-72gx-qq2m-6xr2/GHSA-72gx-qq2m-6xr2.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-72gx-qq2m-6xr2
Finding: F422
Auto approve: 1