Jenkins Groovy Plugin sandbox bypass vulnerability
High severity
GitHub Reviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Dec 30, 2023
Description
Published by the National Vulnerability Database
Feb 6, 2019
Published to the GitHub Advisory Database
May 13, 2022
Reviewed
Dec 6, 2022
Last updated
Dec 30, 2023
A sandbox bypass vulnerability exists in Jenkins Groovy Plugin 2.0 and earlier in
src/main/java/hudson/plugins/groovy/StringScriptSource.java
that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM. In version 2.1, the affected HTTP endpoint applies a safe Groovy compiler configuration preventing the use of unsafe AST transforming annotations.References