CVE-2019-1003034

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-1003034
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-1003034.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-1003034
Aliases
Related
Published
2019-03-08T21:29:00Z
Modified
2024-10-12T04:11:16.684519Z
Severity
  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A sandbox bypass vulnerability exists in Jenkins Job DSL Plugin 1.71 and earlier in job-dsl-core/src/main/groovy/javaposse/jobdsl/dsl/AbstractDslScriptLoader.groovy, job-dsl-plugin/build.gradle, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/JobDslWhitelist.groovy, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/SandboxDslScriptLoader.groovy that allows attackers with control over Job DSL definitions to execute arbitrary code on the Jenkins master JVM.

References

Affected packages

Git / github.com/jenkinsci/job-dsl-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/job-dsl-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

job-dsl-1.*

job-dsl-1.10
job-dsl-1.11
job-dsl-1.14
job-dsl-1.15
job-dsl-1.17
job-dsl-1.18
job-dsl-1.19
job-dsl-1.20
job-dsl-1.21
job-dsl-1.22
job-dsl-1.23
job-dsl-1.24
job-dsl-1.25
job-dsl-1.26
job-dsl-1.27
job-dsl-1.28
job-dsl-1.29
job-dsl-1.3
job-dsl-1.30
job-dsl-1.31
job-dsl-1.32
job-dsl-1.33
job-dsl-1.34
job-dsl-1.35
job-dsl-1.36
job-dsl-1.37
job-dsl-1.38
job-dsl-1.39
job-dsl-1.4
job-dsl-1.40
job-dsl-1.41
job-dsl-1.42
job-dsl-1.43
job-dsl-1.44
job-dsl-1.45
job-dsl-1.46
job-dsl-1.47
job-dsl-1.48
job-dsl-1.49
job-dsl-1.50
job-dsl-1.51
job-dsl-1.52
job-dsl-1.53
job-dsl-1.54
job-dsl-1.55
job-dsl-1.56
job-dsl-1.57
job-dsl-1.58
job-dsl-1.59
job-dsl-1.60
job-dsl-1.61
job-dsl-1.62
job-dsl-1.63
job-dsl-1.64
job-dsl-1.65
job-dsl-1.66
job-dsl-1.67
job-dsl-1.68
job-dsl-1.69
job-dsl-1.7
job-dsl-1.70
job-dsl-1.71
job-dsl-1.8
job-dsl-1.9