First published: Thu Sep 12 2019(Updated: )
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions on the left-hand side of assignment expressions allowed attackers to execute arbitrary code in sandboxed scripts.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Script Security | <=1.62 | |
maven/org.jenkins-ci.plugins:script-security | <=1.62 | 1.63 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10394 is classified as a medium-severity vulnerability due to its potential to allow arbitrary code execution in sandboxed scripts.
To mitigate CVE-2019-10394, upgrade Jenkins Script Security Plugin to version 1.63 or later.
CVE-2019-10394 is a sandbox bypass vulnerability affecting the Jenkins Script Security Plugin.
CVE-2019-10394 affects Jenkins Script Security Plugin versions 1.62 and earlier.
An attacker exploiting CVE-2019-10394 can execute arbitrary code within sandboxed scripts, compromising the affected Jenkins instance.