A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers with Job/Configure permission, or unauthorized attackers with SCM commit privileges and corresponding pipelines based on Jenkinsfiles set up in Jenkins, to execute arbitrary code on the Jenkins master JVM
Advisories
Source ID Title
EUVD EUVD EUVD-2022-3993 A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers with Job/Configure permission, or unauthorized attackers with SCM commit privileges and corresponding pipelines based on Jenkinsfiles set up in Jenkins, to execute arbitrary code on the Jenkins master JVM
Github GHSA Github GHSA GHSA-gqhm-4h93-rrhg Jenkins Script Security and Pipeline Groovy Plugins Sandbox Bypass
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T12:47:56.163Z

Reserved: 2018-12-10T00:00:00

Link: CVE-2018-1000866

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-12-10T14:29:01.667

Modified: 2024-11-21T03:40:31.837

Link: CVE-2018-1000866

cve-icon Redhat

Severity : Important

Publid Date: 2018-10-29T00:00:00Z

Links: CVE-2018-1000866 - Bugzilla

cve-icon OpenCVE Enrichment

No data.