CVE-2019-10431

critical

Description

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.

References

https://jenkins.io/security/advisory/2019-10-01/#SECURITY-1579

https://access.redhat.com/errata/RHSA-2019:4097

https://access.redhat.com/errata/RHSA-2019:4089

https://access.redhat.com/errata/RHSA-2019:4055

http://www.openwall.com/lists/oss-security/2019/10/01/2

Details

Source: Mitre, NVD

Published: 2019-10-01

Updated: 2023-10-25

Risk Information

CVSS v2

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 9.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Severity: Critical