Sandbox Bypass in Jenkins Script Security Plugin
CVE-2022-43401 Published on October 19, 2022

A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

NVD


Products Associated with CVE-2022-43401

Want to know whenever a new CVE is published for Jenkins Script Security? stack.watch will email you.

 

Affected Versions

Jenkins project Jenkins Script Security Plugin:

Exploit Probability

EPSS
0.26%
Percentile
49.17%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.