First published: Tue Oct 01 2019(Updated: )
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/script-security | <1.65 | 1.65 |
Jenkins Script Security | <=1.64 | |
maven/org.jenkins-ci.plugins:script-security | <=1.64 | 1.65 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10431 is rated as a high severity vulnerability due to its potential for arbitrary code execution within sandboxed scripts.
To fix CVE-2019-10431, upgrade the Jenkins Script Security Plugin to version 1.65 or later.
CVE-2019-10431 affects Jenkins Script Security Plugin versions up to and including 1.64.
CVE-2019-10431 is a sandbox bypass vulnerability that allows attackers to execute arbitrary code.
The Jenkins Script Security Plugin needs to be updated to address CVE-2019-10431.