[MAVEN:GHSA-6Q78-6XVR-26FG] Jenkins Groovy Plugin sandbox bypass vulnerability

Severity High
Affected Packages 3
Fixed Packages 3
CVEs 1

Jenkins Script Security sandbox protection could be circumvented during the script compilation phase by applying AST transforming annotations such as @Grab to source code elements.

Both the pipeline validation REST APIs and actual script/pipeline execution are affected.

This allowed users with Overall/Read permission, or able to control Jenkinsfile or sandboxed Pipeline shared library contents in SCM, to bypass the sandbox protection and execute arbitrary code on the Jenkins controller.

All known unsafe AST transformations in Groovy are now prohibited in sandboxed scripts.

ID
MAVEN:GHSA-6Q78-6XVR-26FG
Severity
high
URL
https://github.com/advisories/GHSA-6q78-6xvr-26fg
Published
2022-05-13T01:15:20
(2 years ago)
Modified
2023-12-15T17:33:51
(9 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/script-security org.jenkins-ci.plugins script-security <= 1.49
Fixed pkg:maven/org.jenkins-ci.plugins/script-security org.jenkins-ci.plugins script-security = 1.50
Affected pkg:maven/org.jenkins-ci.plugins/pipeline-model-definition org.jenkins-ci.plugins pipeline-model-definition <= 1.3.4
Fixed pkg:maven/org.jenkins-ci.plugins/pipeline-model-definition org.jenkins-ci.plugins pipeline-model-definition = 1.3.4.1
Affected pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps-parent org.jenkins-ci.plugins.workflow workflow-cps-parent <= 2.61
Fixed pkg:maven/org.jenkins-ci.plugins.workflow/workflow-cps-parent org.jenkins-ci.plugins.workflow workflow-cps-parent = 2.61.1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...