Lucene search

K
githubGitHub Advisory DatabaseGHSA-76QJ-9GWH-PVV3
HistoryJan 26, 2023 - 9:30 p.m.

Sandbox bypass in Jenkins Script Security Plugin

2023-01-2621:30:19
CWE-78
GitHub Advisory Database
github.com
45
jenkins
script security
sandbox bypass
vulnerability
map constructors
arbitrary code
attackers
permission
pipelines
jenkins controller
jvm

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

Affected configurations

Vulners
Node
org.jenkins-ci.plugins\Matchscript-security

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%