logo

CVE-2019-1003001 org.jenkins-ci.plugins.workflow:workflow-cps-parent

Package

Manager: maven
Name: org.jenkins-ci.plugins.workflow:workflow-cps-parent
Vulnerable Version: >=0 <2.61.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.93984 pctl0.99881

Details

Jenkins Groovy Plugin sandbox bypass vulnerability Jenkins Script Security sandbox protection could be circumvented during the script compilation phase by applying AST transforming annotations such as `@Grab` to source code elements. Both the pipeline validation REST APIs and actual script/pipeline execution are affected. This allowed users with Overall/Read permission, or able to control Jenkinsfile or sandboxed Pipeline shared library contents in SCM, to bypass the sandbox protection and execute arbitrary code on the Jenkins controller. All known unsafe AST transformations in Groovy are now prohibited in sandboxed scripts.

Metadata

Created: 2022-05-13T01:15:20Z
Modified: 2023-10-25T21:19:55Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6q78-6xvr-26fg/GHSA-6q78-6xvr-26fg.json
CWE IDs: []
Alternative ID: GHSA-6q78-6xvr-26fg
Finding: F422
Auto approve: 1