A sandbox bypass vulnerability exists in Jenkins Job DSL Plugin 1.71 and earlier in job-dsl-core/src/main/groovy/javaposse/jobdsl/dsl/AbstractDslScriptLoader.groovy, job-dsl-plugin/build.gradle, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/JobDslWhitelist.groovy, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/SandboxDslScriptLoader.groovy that allows attackers with control over Job DSL definitions to execute arbitrary code on the Jenkins master JVM.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published: 2019-03-08T21:00:00

Updated: 2024-08-05T03:07:16.812Z

Reserved: 2019-03-08T00:00:00

Link: CVE-2019-1003034

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-08T21:29:00.500

Modified: 2024-11-21T04:17:46.813

Link: CVE-2019-1003034

cve-icon Redhat

Severity : Important

Publid Date: 2019-03-06T00:00:00Z

Links: CVE-2019-1003034 - Bugzilla