A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.
www.openwall.com/lists/oss-security/2019/10/01/2
access.redhat.com/errata/RHSA-2019:4055
access.redhat.com/errata/RHSA-2019:4089
access.redhat.com/errata/RHSA-2019:4097
github.com/jenkinsci/script-security-plugin
github.com/jenkinsci/script-security-plugin/blob/7bd58b8635709cecdb50018844e5d6dbe1ce13ea/CHANGELOG.md
github.com/jenkinsci/script-security-plugin/commit/415b6e2f3fa0c2e4bd2f9c4a589a9e1fc9cbac8b
jenkins.io/security/advisory/2019-10-01/#SECURITY-1579
nvd.nist.gov/vuln/detail/CVE-2019-10431