First published: Wed Oct 19 2022(Updated: )
A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.11.1683009941-1.el8 | 2-plugins-0:4.11.1683009941-1.el8 |
redhat/jenkins | <2-plugins-0:4.12.1675702407-1.el8 | 2-plugins-0:4.12.1675702407-1.el8 |
redhat/jenkins | <2-plugins-0:4.10.1675144701-1.el8 | 2-plugins-0:4.10.1675144701-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1675668922-1.el8 | 2-plugins-0:4.9.1675668922-1.el8 |
Jenkins Script Security | <=1183.v774b_0b_0a_a_451 | |
maven/org.jenkins-ci.plugins:script-security | <1184.v85d16b | 1184.v85d16b_d851b_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-43403 is considered a high severity vulnerability due to its ability to allow attackers to bypass sandbox protections.
To fix CVE-2022-43403, upgrade to Jenkins Script Security Plugin version 1184.v85d16b or later.
CVE-2022-43403 affects Jenkins Script Security Plugin versions up to and including 1183.v774b_0b_0a_a_451.
CVE-2022-43403 is a sandbox bypass vulnerability that can lead to arbitrary code execution.
Attackers with permission to define and run sandboxed scripts in Jenkins can exploit CVE-2022-43403.