9.9
CVSSv3

CVE-2019-1003030

Published: 08/03/2019 Updated: 25/10/2023
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 9.9 | Impact Score: 6 | Exploitability Score: 3.1
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and previous versions in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins pipeline\\ _groovy

redhat openshift container platform 3.11

Vendor Advisories

Synopsis Important: Red Hat OpenShift Container Platform 311 jenkins-2-plugins security update Type/Severity Security Advisory: Important Topic An update for jenkins-2-plugins is now available for Red Hat OpenShift Container Platform 311Red Hat Product Security has rated this update as having a security ...
Impact: Important Public Date: 2019-03-06 CWE: CWE-20 Bugzilla: 1690665: CVE-2019-1003030 jenkins-plugi ...

Exploits

Jenkins version 263 suffers from a sandbox bypass vulnerability ...

Github Repositories

Jenkins Checkscript RCE Helper Purpose This little helper script was written because I got tired of copy/pasting commands into really long curl statements endlessly during my initial analysis of a CTF Jenkins target The official vulnerabilities for this exploitation: CheckScript RCE in Jenkins - CVE-2019-1003029, CVE-2019-1003030 Features: Automatically retrieve a current J