First published: Wed Aug 28 2019(Updated: )
A sandbox bypass vulnerability in Jenkins Splunk Plugin 1.7.4 and earlier allowed attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.splunk.splunkins:splunk-devops | <1.8.0 | 1.8.0 |
Jenkins | <=1.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10390 has a high severity rating due to its potential for arbitrary code execution on the Jenkins master JVM.
To fix CVE-2019-10390, upgrade the Jenkins Splunk Plugin to version 1.8.0 or later.
CVE-2019-10390 affects Jenkins Splunk Plugin versions up to and including 1.7.4.
CVE-2019-10390 is classified as a sandbox bypass vulnerability.
Attackers with Overall/Read permission in Jenkins can exploit CVE-2019-10390.