Vulnerability Details CVE-2019-10390
A sandbox bypass vulnerability in Jenkins Splunk Plugin 1.7.4 and earlier allowed attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 16.2%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.5
Products affected by CVE-2019-10390
-
cpe:2.3:a:jenkins:splunk:-
-
cpe:2.3:a:jenkins:splunk:1.0
-
cpe:2.3:a:jenkins:splunk:1.1
-
cpe:2.3:a:jenkins:splunk:1.2
-
cpe:2.3:a:jenkins:splunk:1.3
-
cpe:2.3:a:jenkins:splunk:1.3.1
-
cpe:2.3:a:jenkins:splunk:1.4
-
cpe:2.3:a:jenkins:splunk:1.4.1
-
cpe:2.3:a:jenkins:splunk:1.4.2
-
cpe:2.3:a:jenkins:splunk:1.4.3
-
cpe:2.3:a:jenkins:splunk:1.5.0
-
cpe:2.3:a:jenkins:splunk:1.5.1
-
cpe:2.3:a:jenkins:splunk:1.5.2
-
cpe:2.3:a:jenkins:splunk:1.5.3
-
cpe:2.3:a:jenkins:splunk:1.6.0
-
cpe:2.3:a:jenkins:splunk:1.6.1
-
cpe:2.3:a:jenkins:splunk:1.6.2
-
cpe:2.3:a:jenkins:splunk:1.6.3
-
cpe:2.3:a:jenkins:splunk:1.7.0
-
cpe:2.3:a:jenkins:splunk:1.7.1
-
cpe:2.3:a:jenkins:splunk:1.7.2
-
cpe:2.3:a:jenkins:splunk:1.7.3
-
cpe:2.3:a:jenkins:splunk:1.7.4