9.9
CVSSv3

CVE-2019-1003029

Published: 08/03/2019 Updated: 25/10/2023
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 9.9 | Impact Score: 6 | Exploitability Score: 3.1
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and previous versions in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins script security

redhat openshift container platform 3.11

Vendor Advisories

Synopsis Important: Red Hat OpenShift Container Platform 311 jenkins-2-plugins security update Type/Severity Security Advisory: Important Topic An update for jenkins-2-plugins is now available for Red Hat OpenShift Container Platform 311Red Hat Product Security has rated this update as having a security ...
Impact: Important Public Date: 2019-03-06 CWE: CWE-96 Bugzilla: 1689873: CVE-2019-1003029 jenkins-plugi ...

Github Repositories

Jenkins-Rce-2017-2018-2019 Introduction There are four CVEs in this project ,which includes CVE-2017-1000353,CVE-2018-1000861, CVE-2019-1003005 and CVE-2019-1003029 It means you can use this project to test if the website you want to attack has these Jenkins vulnerabilities You can try curl online dnslog platform firstly to test it If it works, you can do further operatio

Phân tích Jenkins RCE - Bypass sandbox I) Buliding Các bạn có thể chạy file docker ở đây hoặc cài đặt jenkins ver 2137 trở xuống, rồi lấy lấy dữ liệu ở sample-vuln\jenkinsdata thay thế dữ liệu ở thư mục jenkins home của các bạn Các bạn cũng có thể tự cài c

Phân tích Jenkins RCE - Bypass sandbox I) Buliding Các bạn có thể chạy file docker ở đây hoặc cài đặt jenkins ver 2137 trở xuống, rồi lấy lấy dữ liệu ở sample-vuln\jenkinsdata thay thế dữ liệu ở thư mục jenkins home của các bạn Các bạn cũng có thể tự cài c

There is no pre-auth RCE in Jenkins since May 2017, but this is the one!

awesome-jenkins-rce-2019 There is no pre-auth RCE in Jenkins since May 2017, but this is the one! It chains CVE-2018-1000861, CVE-2019-1003005 and CVE-2019-1003029 to a more reliable and elegant pre-auth remote code execution! Affect list ANONYMOUS_READ disable Jenkins version < 2138 ANONYMOUS_READ enable(or with a normal user account) Jenkins build time <

Jenkins Checkscript RCE Helper Purpose This little helper script was written because I got tired of copy/pasting commands into really long curl statements endlessly during my initial analysis of a CTF Jenkins target The official vulnerabilities for this exploitation: CheckScript RCE in Jenkins - CVE-2019-1003029, CVE-2019-1003030 Features: Automatically retrieve a current J