Sandbox Bypass Affecting org.jenkins-ci.plugins:script-security package, versions [,1.63)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGJENKINSCIPLUGINS-466731
  • published13 Sept 2019
  • disclosed12 Sept 2019
  • creditNils Emmerich of ERNW Research GmbH

Introduced: 12 Sep 2019

CVE-2019-10393  (opens in a new tab)
CVE-2019-10394  (opens in a new tab)
CVE-2019-10399  (opens in a new tab)
CVE-2019-10400  (opens in a new tab)
CWE-265  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

org.jenkins-ci.plugins:script-security is a package that allows Jenkins administrators to control what in-process scripts can be run by less-privileged users.

Affected versions of this package are vulnerable to Sandbox Bypass. Sandbox protection in Script Security Plugin could be circumvented through any of the following:

  • Crafted method names in method call expressions (CVE-2019-10393)

  • Crafted property names in property expressions on the left-hand side of assignment expressions (CVE-2019-10394)

  • Crafted property names in property expressions in increment and decrement expressions (CVE-2019-10399)

  • Crafted subexpressions in increment and decrement expressions not involving actual assignment (CVE-2019-10400)

This allowed attackers able to specify and run sandboxed scripts to execute arbitrary code in the Jenkins master JVM.

CVSS Scores

version 3.1