First published: Wed Oct 19 2022(Updated: )
A sandbox bypass vulnerability in Jenkins Pipeline: Groovy Libraries Plugin 612.v84da_9c54906d and earlier allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.11.1683009941-1.el8 | 2-plugins-0:4.11.1683009941-1.el8 |
redhat/jenkins | <2-plugins-0:4.12.1675702407-1.el8 | 2-plugins-0:4.12.1675702407-1.el8 |
redhat/jenkins | <2-plugins-0:4.10.1675144701-1.el8 | 2-plugins-0:4.10.1675144701-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1675668922-1.el8 | 2-plugins-0:4.9.1675668922-1.el8 |
Jenkins Groovy Libraries | <=612.v84da_9c54906d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-43405 is classified as a high severity vulnerability due to its potential for arbitrary code execution.
To remediate CVE-2022-43405, update Jenkins Pipeline: Groovy Libraries Plugin to version 612.v84da_9c54906d or later.
CVE-2022-43405 affects Jenkins Pipeline: Groovy Libraries Plugin versions up to and including 612.v84da_9c54906d.
Yes, attackers with the required permissions can exploit CVE-2022-43405 remotely by defining untrusted Pipeline libraries.
To mitigate CVE-2022-43405, ensure that only trusted users have permission to define untrusted Pipeline libraries in Jenkins.