Vulnerability Description
Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin provides a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Kubernetes Pipeline | <= 1.6 |
References
- http://www.openwall.com/lists/oss-security/2019/09/25/3Mailing ListThird Party Advisory
- https://jenkins.io/security/advisory/2019-09-25/#SECURITY-920%20%282%29
- http://www.openwall.com/lists/oss-security/2019/09/25/3Mailing ListThird Party Advisory
- https://jenkins.io/security/advisory/2019-09-25/#SECURITY-920%20%282%29
FAQ
What is CVE-2019-10418?
CVE-2019-10418 is a vulnerability with a CVSS score of 9.9 (CRITICAL). Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin provides a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.
How severe is CVE-2019-10418?
CVE-2019-10418 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-10418?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Kubernetes Pipeline.