Lucene search

K
cveJenkinsCVE-2022-43405
HistoryOct 19, 2022 - 4:15 p.m.

CVE-2022-43405

2022-10-1916:15:10
jenkins
web.nvd.nist.gov
62
4
cve-2022-43405
jenkins
pipeline
groovy libraries
plugin
sandbox bypass
vulnerability
nvd

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.001

Percentile

47.2%

A sandbox bypass vulnerability in Jenkins Pipeline: Groovy Libraries Plugin 612.v84da_9c54906d and earlier allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

Affected configurations

Nvd
Node
jenkinsgroovy_librariesRange612.v84da_9c54906djenkins
VendorProductVersionCPE
jenkinsgroovy_libraries*cpe:2.3:a:jenkins:groovy_libraries:*:*:*:*:*:jenkins:*:*

CNA Affected

[
  {
    "product": "Jenkins Pipeline: Groovy Libraries Plugin",
    "vendor": "Jenkins project",
    "versions": [
      {
        "status": "unaffected",
        "version": "593.595.vfc6485d13dcd"
      },
      {
        "lessThanOrEqual": "612.v84da_9c54906d",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.001

Percentile

47.2%