First published: Fri Mar 08 2019(Updated: )
A sandbox bypass vulnerability exists in Jenkins Matrix Project Plugin 1.13 and earlier in pom.xml, src/main/java/hudson/matrix/FilterScript.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:matrix-project | <1.14 | 1.14 |
redhat/jenkins-plugin-matrix-project | <1.14 | 1.14 |
Jenkins Matrix Project Jenkins | <=1.13 | |
Redhat Openshift Container Platform | =3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-1003031 is critical with a score of 9.9.
The sandbox bypass vulnerability allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM.
Jenkins Matrix Project Plugin versions 1.13 and earlier are affected by CVE-2019-1003031.
To fix CVE-2019-1003031, upgrade to Jenkins Matrix Project Plugin version 1.14.
You can find more information about CVE-2019-1003031 at the following references: [http://www.securityfocus.com/bid/107476](http://www.securityfocus.com/bid/107476), [https://access.redhat.com/errata/RHSA-2019:0739](https://access.redhat.com/errata/RHSA-2019:0739), [https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1339](https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1339).