First published: Wed Jul 31 2019(Updated: )
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of method pointer expressions allowed attackers to execute arbitrary code in sandboxed scripts.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:script-security | <=1.61 | 1.62 |
redhat/jenkins-plugin-script-security | <1.62 | 1.62 |
Jenkins Script Security | <=1.61 | |
redhat openshift container platform | =3.11 | |
redhat openshift container platform | =4.1 | |
Red Hat OpenShift Container Platform | =3.11 | |
Red Hat OpenShift Container Platform | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10356 is considered a critical severity vulnerability as it allows attackers to execute arbitrary code in sandboxed scripts.
To fix CVE-2019-10356, update the Jenkins Script Security Plugin to version 1.62 or later.
Jenkins Script Security Plugin versions 1.61 and earlier are affected by CVE-2019-10356.
Yes, CVE-2019-10356 can impact your Jenkins instance by allowing unauthorized execution of code, leading to potential data breaches.
Yes, certain versions of Red Hat OpenShift Container Platform may be affected by CVE-2019-10356 depending on the Jenkins plugins in use.