First published: Thu Sep 12 2019(Updated: )
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Script Security | <=1.62 | |
maven/org.jenkins-ci.plugins:script-security | <=1.62 | 1.63 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10399 has a critical severity rating due to its potential to allow arbitrary code execution.
To fix CVE-2019-10399, update the Jenkins Script Security Plugin to version 1.63 or later.
CVE-2019-10399 affects Jenkins Script Security Plugin versions 1.62 and earlier.
CVE-2019-10399 is described as a sandbox bypass vulnerability.
Yes, CVE-2019-10399 can lead to execution of arbitrary code, presenting serious security risks.