A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html | Third Party Advisory VDB Entry |
| http://www.securityfocus.com/bid/107476 | Broken Link Third Party Advisory VDB Entry |
| https://access.redhat.com/errata/RHSA-2019:0739 | Third Party Advisory |
| https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%281%29 | Third Party Advisory |
| http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html | Third Party Advisory VDB Entry |
| http://www.securityfocus.com/bid/107476 | Broken Link Third Party Advisory VDB Entry |
| https://access.redhat.com/errata/RHSA-2019:0739 | Third Party Advisory |
| https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%281%29 | Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-1003029 | US Government Resource |
Configurations
History
24 Oct 2025, 14:49
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-1003029 - US Government Resource |
22 Oct 2025, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 04:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
| References | () http://www.securityfocus.com/bid/107476 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () https://access.redhat.com/errata/RHSA-2019:0739 - Third Party Advisory | |
| References | () https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%281%29 - Third Party Advisory |
02 Jul 2024, 16:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.securityfocus.com/bid/107476 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%281%29 - Third Party Advisory |
13 Jun 2022, 18:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
| References | (BID) http://www.securityfocus.com/bid/107476 - Broken Link |
20 Apr 2022, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2019-03-08 21:29
Updated : 2025-10-24 14:49
NVD link : CVE-2019-1003029
Mitre link : CVE-2019-1003029
CVE.ORG link : CVE-2019-1003029
JSON object : View
Products Affected
redhat
- openshift_container_platform
jenkins
- script_security
CWE
