First published: Wed Sep 25 2019(Updated: )
Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin provides a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Kubernetes Pipeline | <=1.6 | |
maven/io.fabric8.pipeline:kubernetes-pipeline-arquillian-steps | <=1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10418 has been rated as a high severity vulnerability due to its ability to bypass security restrictions in Jenkins.
To fix CVE-2019-10418, update to a version of the Jenkins Kubernetes Pipeline that is greater than 1.6.
CVE-2019-10418 affects the Jenkins Kubernetes Pipeline up to version 1.6 and the Kubernetes Pipeline Arquillian Steps Plugin up to version 1.6.
Attackers can invoke arbitrary methods in Jenkins with CVE-2019-10418, effectively bypassing the typical script security sandbox protection.
Currently, the recommended approach to mitigate CVE-2019-10418 is to update to a secure version as no specific workaround has been provided.