Vulnerability Details CVE-2019-1003000
A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java that allows attackers with the ability to provide sandboxed scripts to execute arbitrary code on the Jenkins master JVM.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.942
EPSS Ranking 99.9%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.5
Products affected by CVE-2019-1003000
-
cpe:2.3:a:jenkins:script_security:1.0
-
cpe:2.3:a:jenkins:script_security:1.1
-
cpe:2.3:a:jenkins:script_security:1.10
-
cpe:2.3:a:jenkins:script_security:1.11
-
cpe:2.3:a:jenkins:script_security:1.12
-
cpe:2.3:a:jenkins:script_security:1.13
-
cpe:2.3:a:jenkins:script_security:1.14
-
cpe:2.3:a:jenkins:script_security:1.15
-
cpe:2.3:a:jenkins:script_security:1.16
-
cpe:2.3:a:jenkins:script_security:1.17
-
cpe:2.3:a:jenkins:script_security:1.18
-
cpe:2.3:a:jenkins:script_security:1.18.1
-
cpe:2.3:a:jenkins:script_security:1.19
-
cpe:2.3:a:jenkins:script_security:1.2
-
cpe:2.3:a:jenkins:script_security:1.20
-
cpe:2.3:a:jenkins:script_security:1.21
-
cpe:2.3:a:jenkins:script_security:1.22
-
cpe:2.3:a:jenkins:script_security:1.23
-
cpe:2.3:a:jenkins:script_security:1.24
-
cpe:2.3:a:jenkins:script_security:1.25
-
cpe:2.3:a:jenkins:script_security:1.26
-
cpe:2.3:a:jenkins:script_security:1.27
-
cpe:2.3:a:jenkins:script_security:1.28
-
cpe:2.3:a:jenkins:script_security:1.29
-
cpe:2.3:a:jenkins:script_security:1.29.1
-
cpe:2.3:a:jenkins:script_security:1.3
-
cpe:2.3:a:jenkins:script_security:1.30
-
cpe:2.3:a:jenkins:script_security:1.31
-
cpe:2.3:a:jenkins:script_security:1.32
-
cpe:2.3:a:jenkins:script_security:1.33
-
cpe:2.3:a:jenkins:script_security:1.34
-
cpe:2.3:a:jenkins:script_security:1.35
-
cpe:2.3:a:jenkins:script_security:1.36
-
cpe:2.3:a:jenkins:script_security:1.37
-
cpe:2.3:a:jenkins:script_security:1.38
-
cpe:2.3:a:jenkins:script_security:1.39
-
cpe:2.3:a:jenkins:script_security:1.4
-
cpe:2.3:a:jenkins:script_security:1.40
-
cpe:2.3:a:jenkins:script_security:1.41
-
cpe:2.3:a:jenkins:script_security:1.42
-
cpe:2.3:a:jenkins:script_security:1.43
-
cpe:2.3:a:jenkins:script_security:1.44
-
cpe:2.3:a:jenkins:script_security:1.44.1
-
cpe:2.3:a:jenkins:script_security:1.45
-
cpe:2.3:a:jenkins:script_security:1.46
-
cpe:2.3:a:jenkins:script_security:1.46.1
-
cpe:2.3:a:jenkins:script_security:1.47
-
cpe:2.3:a:jenkins:script_security:1.48
-
cpe:2.3:a:jenkins:script_security:1.49
-
cpe:2.3:a:jenkins:script_security:1.5
-
cpe:2.3:a:jenkins:script_security:1.6
-
cpe:2.3:a:jenkins:script_security:1.7
-
cpe:2.3:a:jenkins:script_security:1.8
-
cpe:2.3:a:jenkins:script_security:1.9
-
cpe:2.3:a:redhat:openshift_container_platform:3.11