First published: Thu Sep 12 2019(Updated: )
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Script Security | <=1.62 | |
maven/org.jenkins-ci.plugins:script-security | <=1.62 | 1.63 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10393 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2019-10393, upgrade the Jenkins Script Security Plugin to version 1.63 or later.
CVE-2019-10393 affects Jenkins Script Security Plugin versions 1.62 and earlier.
Yes, CVE-2019-10393 can be exploited remotely, allowing attackers to execute arbitrary code.
There are no known workarounds for CVE-2019-10393; the recommended action is to update the plugin.