First published: Wed Sep 23 2020(Updated: )
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.74 and earlier allows attackers with permission to define sandboxed scripts to provide crafted return values or script binding content that can result in arbitrary code execution on the Jenkins controller JVM.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Script Security | <=1.74 | |
maven/org.jenkins-ci.plugins:script-security | <1.66.5 | 1.66.5 |
maven/org.jenkins-ci.plugins:script-security | >=1.67<1.75 | 1.75 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-2279.
The severity of CVE-2020-2279 is critical with a CVSS score of 9.9.
Jenkins Script Security Plugin provides a sandbox feature that allows low privileged users to define scripts, including Pipelines, that are generally safe to execute.
The vulnerability in Jenkins Script Security Plugin allows attackers to bypass the sandbox and execute arbitrary code.
To mitigate the vulnerability, users should upgrade Jenkins Script Security Plugin to version 1.75 or later.