9.9
CVSSv3

CVE-2019-1003030

Published: 08/03/2019 Updated: 25/10/2023
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 9.9 | Impact Score: 6 | Exploitability Score: 3.1
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and previous versions in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins pipeline groovy

redhat openshift container platform 3.11

Vendor Advisories

Synopsis Important: Red Hat OpenShift Container Platform 311 jenkins-2-plugins security update Type/Severity Security Advisory: Important Topic An update for jenkins-2-plugins is now available for Red Hat OpenShift Container Platform 311Red Hat Product Security has rated this update as having a security ...
Impact: Important Public Date: 2019-03-06 CWE: CWE-20 Bugzilla: 1690665: CVE-2019-1003030 jenkins-plugi ...

Exploits

Jenkins version 263 suffers from a sandbox bypass vulnerability ...

Github Repositories

Jenkins Checkscript RCE Helper Purpose This little helper script was written because I got tired of copy/pasting commands into really long curl statements endlessly during my initial analysis of a CTF Jenkins target The official vulnerabilities for this exploitation: CheckScript RCE in Jenkins - CVE-2019-1003029, CVE-2019-1003030 Features: Automatically retrieve a current J