Vulnerability Description
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.55 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Script Security | <= 1.55 |
| Redhat | Openshift Container Platform | 3.11 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2019/03/28/2Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/107628Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2019:1423Third Party Advisory
- https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353Vendor Advisory
- http://www.openwall.com/lists/oss-security/2019/03/28/2Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/107628Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2019:1423Third Party Advisory
- https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353Vendor Advisory
FAQ
What is CVE-2019-1003040?
CVE-2019-1003040 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.55 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts.
How severe is CVE-2019-1003040?
CVE-2019-1003040 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-1003040?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Script Security, Redhat Openshift Container Platform.