First published: Mon Dec 10 2018(Updated: )
A sandbox bypass vulnerability exists in Script Security Plugin 1.47 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM, if plugins using the Groovy sandbox are installed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:script-security | <=1.47 | 1.48 |
Jenkins Script Security | <=1.47 | |
redhat openshift container platform | =3.11 | |
Red Hat OpenShift Container Platform | =3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000865 is considered a critical vulnerability as it allows attackers to execute arbitrary code on the Jenkins master JVM.
To fix CVE-2018-1000865, upgrade the Script Security Plugin to version 1.48 or later.
CVE-2018-1000865 affects Jenkins installations using Script Security Plugin versions 1.47 and earlier.
An attacker needs Job/Configure permission to exploit CVE-2018-1000865.
CVE-2018-1000865 primarily involves the Script Security Plugin in Jenkins.