CVE Vulnerabilities

CVE-2019-1003040

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

Published: Mar 28, 2019 | Modified: Oct 25, 2023
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.8 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.55 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts.

Weakness

The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.

Affected Software

Name Vendor Start Version End Version
Script_security Jenkins * 1.55 (including)
Red Hat OpenShift Container Platform 3.11 RedHat jenkins-2-plugins-0:3.11.1553788831-1.el7 *

Potential Mitigations

References