Vulnerability Description
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Script Security | <= 1.52 |
| Redhat | Openshift Container Platform | 3.11 |
References
- http://www.securityfocus.com/bid/107295Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2019:0739Third Party Advisory
- https://jenkins.io/security/advisory/2019-02-19/#SECURITY-1320Vendor Advisory
- http://www.securityfocus.com/bid/107295Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2019:0739Third Party Advisory
- https://jenkins.io/security/advisory/2019-02-19/#SECURITY-1320Vendor Advisory
FAQ
What is CVE-2019-1003024?
CVE-2019-1003024 is a vulnerability with a CVSS score of 8.8 (HIGH). A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy sc...
How severe is CVE-2019-1003024?
CVE-2019-1003024 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-1003024?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Script Security, Redhat Openshift Container Platform.