SB2019012212 - Sandbox restrictions bypass in Pipeline: Groovy plugin for Jenkins 



SB2019012212 - Sandbox restrictions bypass in Pipeline: Groovy plugin for Jenkins

Published: January 22, 2019 Updated: October 7, 2019

Security Bulletin ID SB2019012212
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper access control (CVE-ID: CVE-2019-1003001)

The vulnerability allows a remote attacker to bypass sandbox restrictions.

The vulnerability exists due to improper access restrictions in "src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java" and "src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java" when applying AST transforming annotations such as @Grab to source code elements. A remote authenticated attacker with Overall/Read permission, or able to control Jenkins file or sandboxed Pipeline shared library contents in SCM, can bypass the sandbox protection and execute arbitrary code on the Jenkins master.


Remediation

Install update from vendor's website.