A sandbox bypass vulnerability in Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier allows attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM through crafted SCM contents, if a global Pipeline library already exists.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pipeline:shared_groovy_libraries | Jenkins | * | 552.vd9cc05b8a2e1 (including) |
Red Hat OpenShift Container Platform 3.11 | RedHat | jenkins-2-plugins-0:3.11.1650371376-1.el7 | * |
Red Hat OpenShift Container Platform 4.10 | RedHat | jenkins-2-plugins-0:4.10.1647505461-1.el8 | * |
Red Hat OpenShift Container Platform 4.6 | RedHat | jenkins-2-plugins-0:4.6.1650364520-1.el8 | * |
Red Hat OpenShift Container Platform 4.7 | RedHat | jenkins-2-plugins-0:4.7.1648800585-1.el8 | * |
Red Hat OpenShift Container Platform 4.8 | RedHat | jenkins-2-plugins-0:4.8.1646993358-1.el8 | * |
Red Hat OpenShift Container Platform 4.9 | RedHat | jenkins-2-plugins-0:4.9.1647580879-1.el8 | * |