Lucene search

K
osvGoogleOSV:GHSA-GQHM-4H93-RRHG
HistoryMay 13, 2022 - 1:48 a.m.

Jenkins Script Security and Pipeline Groovy Plugins Sandbox Bypass

2022-05-1301:48:40
Google
osv.dev
8

7.7 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

71.3%

A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers with Job/Configure permission, or unauthorized attackers with SCM commit privileges and corresponding pipelines based on Jenkinsfiles set up in Jenkins, to execute arbitrary code on the Jenkins master JVM

7.7 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

71.3%

Related for OSV:GHSA-GQHM-4H93-RRHG