Vulnerability Description
A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Pipeline\ | <= 2.63, _groovy |
| Redhat | Openshift Container Platform | 3.11 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/159603/Jenkins-2.63-Sandbox-Bypass.htmlExploitThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/107476Broken LinkThird Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2019:0739Third Party Advisory
- https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%282%29Third Party Advisory
- http://packetstormsecurity.com/files/159603/Jenkins-2.63-Sandbox-Bypass.htmlExploitThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/107476Broken LinkThird Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2019:0739Third Party Advisory
- https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%282%29Third Party Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-US Government Resource
FAQ
What is CVE-2019-1003030?
CVE-2019-1003030 is a vulnerability with a CVSS score of 9.9 (CRITICAL). A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to...
How severe is CVE-2019-1003030?
CVE-2019-1003030 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-1003030?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Pipeline\, Redhat Openshift Container Platform.