Lucene search

K
cveJenkinsCVE-2022-43401
HistoryOct 19, 2022 - 4:15 p.m.

CVE-2022-43401

2022-10-1916:15:10
jenkins
web.nvd.nist.gov
75
8
cve-2022-43401
sandbox bypass
jenkins
script security plugin
vulnerability
groovy
nvd

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.001

Percentile

48.1%

A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

Affected configurations

Nvd
Node
jenkinsscript_securityRange1183.v774b_0b_0a_a_451jenkins
VendorProductVersionCPE
jenkinsscript_security*cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*

CNA Affected

[
  {
    "product": "Jenkins Script Security Plugin",
    "vendor": "Jenkins project",
    "versions": [
      {
        "status": "unaffected",
        "version": "1175.1177.vda_175b_77d144"
      },
      {
        "lessThanOrEqual": "1183.v774b_0b_0a_a_451",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.001

Percentile

48.1%