Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-p1ww-dzs9-9fez |
| Summary | Sandbox bypass in Script Security Plugin
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM. |
| Aliases |
| 0 |
|
| 1 |
| alias |
GHSA-xvxq-hq48-xphm |
|
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://access.redhat.com/errata/RHSA-2019:0739 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
|
| 1 |
| value |
9.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:H |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:06:12Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2019:0739 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003029 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.92647 |
| scoring_system |
epss |
| scoring_elements |
0.99752 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.92647 |
| scoring_system |
epss |
| scoring_elements |
0.99744 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.92647 |
| scoring_system |
epss |
| scoring_elements |
0.99745 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.92647 |
| scoring_system |
epss |
| scoring_elements |
0.99747 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.92647 |
| scoring_system |
epss |
| scoring_elements |
0.99748 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.92647 |
| scoring_system |
epss |
| scoring_elements |
0.99749 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.92647 |
| scoring_system |
epss |
| scoring_elements |
0.99751 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003029 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003029 |
| reference_id |
CVE-2019-1003029 |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:P/A:P |
|
| 1 |
| value |
9.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:H |
|
| 2 |
| value |
9.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003029 |
|
| 13 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
693 |
| name |
Protection Mechanism Failure |
| description |
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. |
|
| 1 |
| cwe_id |
937 |
| name |
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013. |
|
| 2 |
| cwe_id |
1035 |
| name |
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017. |
|
| 3 |
| cwe_id |
96 |
| name |
Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') |
| description |
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before inserting the input into an executable resource, such as a library, configuration file, or template. |
|
|
| Exploits |
| 0 |
| date_added |
null |
| description |
This module exploits a vulnerability in Jenkins dynamic routing to
bypass the Overall/Read ACL and leverage Groovy metaprogramming to
download and execute a malicious JAR file.
When the "Java Dropper" target is selected, the original entry point
based on classLoader.parseClass is used, which requires the use of
Groovy metaprogramming to achieve RCE.
When the "Unix In-Memory" target is selected, a newer, higher-level,
and more universal entry point based on GroovyShell.parse is used.
This permits the use of in-memory arbitrary command execution.
The ACL bypass gadget is specific to Jenkins <= 2.137 and will not work
on later versions of Jenkins.
Tested against Jenkins 2.137 and Pipeline: Groovy Plugin 2.61. |
| required_action |
null |
| due_date |
null |
| notes |
Stability:
- crash-safe
Reliability:
- repeatable-session
SideEffects:
- ioc-in-logs
- artifacts-on-disk
|
| known_ransomware_campaign_use |
false |
| source_date_published |
2019-01-08 |
| exploit_type |
null |
| platform |
Java,Unix |
| source_date_updated |
null |
| data_source |
Metasploit |
| source_url |
https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/http/jenkins_metaprogramming.rb |
|
| 1 |
| date_added |
2022-04-25 |
| description |
Jenkins Script Security Plugin contains a protection mechanism failure, allowing an attacker to bypass the sandbox. |
| required_action |
Apply updates per vendor instructions. |
| due_date |
2022-05-16 |
| notes |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003029 |
| known_ransomware_campaign_use |
false |
| source_date_published |
null |
| exploit_type |
null |
| platform |
null |
| source_date_updated |
null |
| data_source |
KEV |
| source_url |
null |
|
|
| Severity_range_score | 6.5 - 10.0 |
| Exploitability | 2.0 |
| Weighted_severity | 9.0 |
| Risk_score | 10.0 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-p1ww-dzs9-9fez |