First published: Thu Apr 18 2019(Updated: )
A sandbox bypass vulnerability in Jenkins ontrack Plugin 3.4 and earlier allowed attackers with control over ontrack DSL definitions to execute arbitrary code on the Jenkins master JVM.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins ontrack Jenkins | <=3.4 | |
maven/org.jenkins-ci.plugins:ontrack | <3.4.1 | 3.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10306 has a high severity rating due to its potential to allow execution of arbitrary code on the Jenkins master JVM.
To fix CVE-2019-10306, upgrade the Jenkins ontrack Plugin to version 3.4.1 or later.
CVE-2019-10306 affects Jenkins ontrack Plugin versions 3.4 and earlier.
CVE-2019-10306 is a sandbox bypass vulnerability that allows for arbitrary code execution.
Users of the Jenkins ontrack Plugin who allow control over ontrack DSL definitions are primarily affected by CVE-2019-10306.