First published: Wed Jul 31 2019(Updated: )
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of type casts allowed attackers to execute arbitrary code in sandboxed scripts.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Script Security | <=1.61 | |
Redhat Openshift Container Platform | =3.11 | |
Redhat Openshift Container Platform | =4.1 | |
maven/org.jenkins-ci.plugins:script-security | <=1.61 | 1.62 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10355 is a sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier that allows attackers to execute arbitrary code in sandboxed scripts.
The severity of CVE-2019-10355 is high, with a CVSS score of 8.8.
CVE-2019-10355 affects Jenkins Script Security Plugin versions 1.61 and earlier.
To fix CVE-2019-10355, you should upgrade Jenkins Script Security Plugin to version 1.62.
Yes, you can find additional information about CVE-2019-10355 at the following references: - [Jenkins Security Advisory](https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465) - [Redhat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1735516) - [OpenShift Jenkins README](https://github.com/openshift/jenkins/blob/master/README.md#jenkins-security-advisories-the-master-image-from-this-repository-and-the-oc-binary)