CVE Vulnerabilities

CVE-2019-1003041

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

Published: Mar 28, 2019 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.8 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

A sandbox bypass vulnerability in Jenkins Pipeline: Groovy Plugin 2.64 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts.

Weakness

The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.

Affected Software

NameVendorStart VersionEnd Version
Pipeline:_groovyJenkins*2.64 (including)
Red Hat OpenShift Container Platform 3.11RedHatjenkins-2-plugins-0:3.11.1553788831-1.el7*

Potential Mitigations

References