First published: Wed Oct 19 2022(Updated: )
A sandbox bypass vulnerability in Jenkins Pipeline: Deprecated Groovy Libraries Plugin 583.vf3b_454e43966 and earlier allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Groovy Libraries | <=583.vf3b_454e43966 | |
redhat/Pipeline Deprecated Groovy Libraries Plugin | <588. | 588. |
redhat/jenkins | <2-plugins-0:4.11.1683009941-1.el8 | 2-plugins-0:4.11.1683009941-1.el8 |
redhat/jenkins | <2-plugins-0:4.12.1675702407-1.el8 | 2-plugins-0:4.12.1675702407-1.el8 |
redhat/jenkins | <2-plugins-0:4.10.1675144701-1.el8 | 2-plugins-0:4.10.1675144701-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1675668922-1.el8 | 2-plugins-0:4.9.1675668922-1.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-43406 has a high severity due to its potential to allow unauthorized execution of scripts and bypassing of sandbox protections.
To fix CVE-2022-43406, upgrade the Jenkins Pipeline: Deprecated Groovy Libraries Plugin to version 588.vf3b_454e43967 or later.
CVE-2022-43406 affects Jenkins with Pipeline: Deprecated Groovy Libraries Plugin version 583.vf3b_454e43966 and earlier.
Yes, CVE-2022-43406 can be exploited remotely by an attacker with permission to define untrusted Pipeline libraries.
The impact of CVE-2022-43406 is significant as it allows attackers to bypass security controls and execute arbitrary code within the Jenkins environment.