A sandbox bypass vulnerability exists in Jenkins Job DSL Plugin 1.71 and earlier in job-dsl-core/src/main/groovy/javaposse/jobdsl/dsl/AbstractDslScriptLoader.groovy, job-dsl-plugin/build.gradle, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/JobDslWhitelist.groovy, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/SandboxDslScriptLoader.groovy that allows attackers with control over Job DSL definitions to execute arbitrary code on the Jenkins master JVM.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Job_dsl | Jenkins | * | 1.71 (including) |
Red Hat OpenShift Container Platform 3.11 | RedHat | jenkins-2-plugins-0:3.11.1552336312-1.el7 | * |