Show plain JSON{"affected_release": [{"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-enterprise-service-catalog-1:3.11.82-1.git.1673.133961e.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-0:3.11.82-1.git.0.08bc31b.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-cluster-autoscaler-0:3.11.82-1.git.0.efb6af0.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-descheduler-0:3.11.82-1.git.300.89765c9.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-dockerregistry-0:3.11.82-1.git.452.0ce6383.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-metrics-server-0:3.11.82-1.git.52.2fdca3f.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-node-problem-detector-0:3.11.82-1.git.254.a448936.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-service-idler-0:3.11.82-1.git.14.e353758.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-web-console-0:3.11.82-1.git.355.5e8b1d9.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "golang-github-openshift-oauth-proxy-0:3.11.82-1.git.425.7cac034.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "golang-github-prometheus-alertmanager-0:3.11.82-1.git.0.3bf41ce.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "golang-github-prometheus-node_exporter-0:3.11.82-1.git.1063.48444e8.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "golang-github-prometheus-prometheus-0:3.11.82-1.git.5027.9d24833.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "haproxy-0:1.8.17-3.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "jenkins-0:2.150.2.1549032159-1.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "jenkins-2-plugins-0:3.11.1549642489-1.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "openshift-ansible-0:3.11.82-3.git.0.9718d0a.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "openshift-enterprise-autoheal-0:3.11.82-1.git.219.0b5aff4.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}, {"advisory": "RHBA-2019:0326", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "openshift-enterprise-cluster-capacity-0:3.11.82-1.git.380.cf11c51.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2019-02-20T00:00:00Z"}], "bugzilla": {"description": "jenkins-plugin-workflow-cps: Sandbox Bypass in Pipeline: Groovy Plugin", "id": "1669505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1669505"}, "csaw": false, "cvss3": {"cvss3_base_score": "8.8", "cvss3_scoring_vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "status": "verified"}, "cwe": "CWE-96", "details": ["A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.", "A flaw was found in Jenkins Pipeline. In the Declarative plugin, the script sandbox protection could be circumvented during the script compilation phase by applying AST. Both the pipeline validation REST APIs and the actual script/pipeline execution are affected. This allows users with Overall/Read permissions, or those able to control Jenkinsfile or the sandboxed Pipeline shared library contents in SCM, to bypass sandbox protection and execute arbitrary code on the Jenkins master. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."], "name": "CVE-2019-1003001", "package_state": [{"cpe": "cpe:/a:redhat:openshift:3.10", "fix_state": "Affected", "package_name": "jenkins-plugin-workflow-cps", "product_name": "Red Hat OpenShift Container Platform 3.10"}, {"cpe": "cpe:/a:redhat:openshift:3.2", "fix_state": "Out of support scope", "package_name": "jenkins-plugin-workflow-cps", "product_name": "Red Hat OpenShift Container Platform 3.2"}, {"cpe": "cpe:/a:redhat:openshift:3.3", "fix_state": "Out of support scope", "package_name": "jenkins-plugin-workflow-cps", "product_name": "Red Hat OpenShift Container Platform 3.3"}, {"cpe": "cpe:/a:redhat:openshift:3.4", "fix_state": "Affected", "package_name": "jenkins-plugin-workflow-cps", "product_name": "Red Hat OpenShift Container Platform 3.4"}, {"cpe": "cpe:/a:redhat:openshift:3.5", "fix_state": "Affected", "package_name": "jenkins-plugin-workflow-cps", "product_name": "Red Hat OpenShift Container Platform 3.5"}, {"cpe": "cpe:/a:redhat:openshift:3.6", "fix_state": "Affected", "package_name": "jenkins-plugin-workflow-cps", "product_name": "Red Hat OpenShift Container Platform 3.6"}, {"cpe": "cpe:/a:redhat:openshift:3.7", "fix_state": "Affected", "package_name": "jenkins-plugin-workflow-cps", "product_name": "Red Hat OpenShift Container Platform 3.7"}, {"cpe": "cpe:/a:redhat:openshift:3.9", "fix_state": "Affected", "package_name": "jenkins-plugin-workflow-cps", "product_name": "Red Hat OpenShift Container Platform 3.9"}, {"cpe": "cpe:/a:redhat:openshift:4", "fix_state": "Not affected", "package_name": "jenkins-2-plugins", "product_name": "Red Hat OpenShift Container Platform 4"}], "public_date": "2019-01-08T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2019-1003001\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-1003001\nhttps://jenkins.io/security/advisory/2019-01-08/"], "threat_severity": "Important"}