Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-ct1b-eyhf-tban |
| Summary | Code Injection
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin in `src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java` that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM. |
| Aliases |
| 0 |
|
| 1 |
| alias |
GHSA-x5jm-rj37-5qh7 |
|
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003005 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.74186 |
| scoring_system |
epss |
| scoring_elements |
0.98853 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.74186 |
| scoring_system |
epss |
| scoring_elements |
0.98831 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.74186 |
| scoring_system |
epss |
| scoring_elements |
0.98833 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.74186 |
| scoring_system |
epss |
| scoring_elements |
0.98834 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.74186 |
| scoring_system |
epss |
| scoring_elements |
0.98836 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.74186 |
| scoring_system |
epss |
| scoring_elements |
0.98837 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.74186 |
| scoring_system |
epss |
| scoring_elements |
0.98838 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.74186 |
| scoring_system |
epss |
| scoring_elements |
0.98842 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.74186 |
| scoring_system |
epss |
| scoring_elements |
0.98843 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.74186 |
| scoring_system |
epss |
| scoring_elements |
0.98848 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.74186 |
| scoring_system |
epss |
| scoring_elements |
0.98852 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.74186 |
| scoring_system |
epss |
| scoring_elements |
0.98827 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.74186 |
| scoring_system |
epss |
| scoring_elements |
0.98828 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003005 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
1035 |
| name |
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017. |
|
| 1 |
| cwe_id |
937 |
| name |
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013. |
|
| 2 |
| cwe_id |
693 |
| name |
Protection Mechanism Failure |
| description |
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. |
|
| 3 |
| cwe_id |
96 |
| name |
Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') |
| description |
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before inserting the input into an executable resource, such as a library, configuration file, or template. |
|
|
| Exploits |
| 0 |
| date_added |
null |
| description |
This module exploits a vulnerability in Jenkins dynamic routing to
bypass the Overall/Read ACL and leverage Groovy metaprogramming to
download and execute a malicious JAR file.
When the "Java Dropper" target is selected, the original entry point
based on classLoader.parseClass is used, which requires the use of
Groovy metaprogramming to achieve RCE.
When the "Unix In-Memory" target is selected, a newer, higher-level,
and more universal entry point based on GroovyShell.parse is used.
This permits the use of in-memory arbitrary command execution.
The ACL bypass gadget is specific to Jenkins <= 2.137 and will not work
on later versions of Jenkins.
Tested against Jenkins 2.137 and Pipeline: Groovy Plugin 2.61. |
| required_action |
null |
| due_date |
null |
| notes |
Stability:
- crash-safe
Reliability:
- repeatable-session
SideEffects:
- ioc-in-logs
- artifacts-on-disk
|
| known_ransomware_campaign_use |
false |
| source_date_published |
2019-01-08 |
| exploit_type |
null |
| platform |
Java,Unix |
| source_date_updated |
null |
| data_source |
Metasploit |
| source_url |
https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/http/jenkins_metaprogramming.rb |
|
|
| Severity_range_score | 6.5 - 8.9 |
| Exploitability | 2.0 |
| Weighted_severity | 8.0 |
| Risk_score | 10.0 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-ct1b-eyhf-tban |