Lucene search

K
osvGoogleOSV:GHSA-CJR8-5RW4-WH65
HistoryMay 24, 2022 - 4:55 p.m.

Jenkins Splunk Plugin Sandbox Bypass

2022-05-2416:55:01
Google
osv.dev
9
jenkins
splunk plugin
sandbox bypass
form validation
http endpoint
groovy script
compilation
ast transforming annotations
overall/read access
arbitrary code
jenkins controller

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

47.2%

Jenkins Splunk Plugin has a form validation HTTP endpoint used to validate a user-submitted Groovy script through compilation, which was not subject to sandbox protection. This allowed attackers with Overall/Read access to execute arbitrary code on the Jenkins controller by applying AST transforming annotations such as @Grab to source code elements.

The affected HTTP endpoint now applies a safe Groovy compiler configuration preventing the use of unsafe AST transforming annotations.

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

47.2%

Related for OSV:GHSA-CJR8-5RW4-WH65