Lucene search

K
osvGoogleOSV:GHSA-GQHM-4H93-RRHG
HistoryMay 13, 2022 - 1:48 a.m.

Jenkins Script Security and Pipeline Groovy Plugins Sandbox Bypass

2022-05-1301:48:40
Google
osv.dev
11
jenkins
script security
pipeline groovy
sandbox bypass
arbitrary code
jvm

AI Score

7.7

Confidence

High

EPSS

0.003

Percentile

71.2%

A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers with Job/Configure permission, or unauthorized attackers with SCM commit privileges and corresponding pipelines based on Jenkinsfiles set up in Jenkins, to execute arbitrary code on the Jenkins master JVM

AI Score

7.7

Confidence

High

EPSS

0.003

Percentile

71.2%

Related for OSV:GHSA-GQHM-4H93-RRHG