logo

CVE-2019-10431 org.jenkins-ci.plugins:script-security

Package

Manager: maven
Name: org.jenkins-ci.plugins:script-security
Vulnerable Version: >=0 <1.65

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.00407 pctl0.60353

Details

Improper Control of Generation of Code in Jenkins Script Security Plugin A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.

Metadata

Created: 2022-05-24T16:57:28Z
Modified: 2023-10-26T18:53:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-72gx-qq2m-6xr2/GHSA-72gx-qq2m-6xr2.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-72gx-qq2m-6xr2
Finding: F422
Auto approve: 1