CVE-2020-2109Improper Input Validation in Project Jenkins Pipeline Groovy Plugin

Severity
8.8HIGHNVD
EPSS
0.5%
top 35.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 12
Latest updateMay 24

Description

Sandbox protection in Jenkins Pipeline: Groovy Plugin 2.78 and earlier can be circumvented through default parameter expressions in CPS-transformed methods.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5jenkins_project/jenkins_pipeline_groovy_pluginunspecified2.78

🔴Vulnerability Details

3
GHSA
Improper Input Validation in Jenkins Pipeline: Groovy Plugin2022-05-24
OSV
Improper Input Validation in Jenkins Pipeline: Groovy Plugin2022-05-24
CVEList
CVE-2020-2109: Sandbox protection in Jenkins Pipeline: Groovy Plugin 22020-02-12

📋Vendor Advisories

2
Red Hat
jenkins-pipeline-groovy-plugin: sandbox protection bypass through default parameter expressions in CPS-transformed methods2020-02-12
Jenkins
Jenkins Security Advisory 2020-02-122020-02-12

💬Community

1
Bugzilla
CVE-2020-2109 jenkins-pipeline-groovy-plugin: sandbox protection bypass through default parameter expressions in CPS-transformed methods2020-03-31
CVE-2020-2109 — Improper Input Validation | cvebase