A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of method pointer expressions allowed attackers to execute arbitrary code in sandboxed scripts.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2) | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2019/07/31/1 | Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2651 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2594 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2662 | Third Party Advisory |
Information
Published : 2019-07-31 06:15
Updated : 2020-10-02 07:22
NVD link : CVE-2019-10356
Mitre link : CVE-2019-10356
JSON object : View
CWE
Products Affected
jenkins
- script_security
redhat
- openshift_container_platform