Sandbox Bypass Affecting org.jenkins-ci.plugins:job-dsl package, versions [,1.72)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.36% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGJENKINSCIPLUGINS-450038
  • published17 Jun 2019
  • disclosed6 Mar 2019
  • creditUnknown

Introduced: 6 Mar 2019

CVE-2019-1003034  (opens in a new tab)
CWE-254  (opens in a new tab)

How to fix?

Upgrade org.jenkins-ci.plugins:job-dsl to version 1.72 or higher.

Overview

org.jenkins-ci.plugins:job-dsl is a groovy DSL plugin for Jenkins Jobs.

Affected versions of this package are vulnerable to Sandbox Bypass in the following classes: job-dsl-core/src/main/groovy/javaposse/jobdsl/dsl/AbstractDslScriptLoader.groovy, job-dsl-plugin/build.gradle, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/JobDslWhitelist.groovy, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/SandboxDslScriptLoader.groovy. An attacker with control over Job DSL definitions is allowed to execute arbitrary code on the Jenkins master JVM.

CVSS Scores

version 3.1