Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2019-1003002 — Static Code Injection in Jenkins Pipeline
Severity
8.8HIGHNVD
EPSS
93.5%
top 0.18%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 22
Latest updateMay 13
Description
A sandbox bypass vulnerability exists in Pipeline: Declarative Plugin 1.3.3 and earlier in pipeline-model-definition/src/main/groovy/org/jenkinsci/plugins/pipeline/modeldefinition/parser/Converter.groovy that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages2 packages
Also affects: Openshift Container Platform 3.11
🔴Vulnerability Details
3💥Exploits & PoCs
3📋Vendor Advisories
2💬Community
1Bugzilla▶
CVE-2019-1003002 jenkins-plugin-pipeline-model-definition: Sandbox Bypass in Pipeline: Declarative↗2019-01-25