Search for packages
| purl | pkg:maven/org.jenkinsci.plugins/pipeline-model-parent@1.3.3 |
| Next non-vulnerable version | 1.3.4.1 |
| Latest non-vulnerable version | 2.2218.v56d0cda |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-ygq7-sv7h-7fax
Aliases: CVE-2019-1003002 GHSA-x6jx-cxg3-mggh |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') A sandbox bypass vulnerability exists in Pipeline: Declarative Plugin 1.3.3 and earlier in pipeline-model-definition/src/main/groovy/org/jenkinsci/plugins/pipeline/modeldefinition/parser/Converter.groovy that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T12:50:20.659756+00:00 | GitLab Importer | Affected by | VCID-ygq7-sv7h-7fax | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkinsci.plugins/pipeline-model-parent/CVE-2019-1003002.yml | 38.0.0 |