Description
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6q78-6xvr-26fg | Jenkins Groovy Plugin sandbox bypass vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-05T03:00:19.299Z
Reserved: 2019-01-22T00:00:00.000Z
Link: CVE-2019-1003001
No data.
Status : Modified
Published: 2019-01-22T14:29:00.330
Modified: 2024-11-21T04:17:43.027
Link: CVE-2019-1003001
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA