SB2019091602 - Multiple vulnerabilities in Script Security plugin for Jenkins



SB2019091602 - Multiple vulnerabilities in Script Security plugin for Jenkins

Published: September 16, 2019

Security Bulletin ID SB2019091602
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-10393)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper handling of method names in method call expressions. A remote authenticated attacker can specify and run sandboxed scripts to execute arbitrary code the target system.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-10394)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper handling of property names in property expressions on the left-hand side of assignment expressions. A remote authenticated attacker can specify and run sandboxed scripts to execute arbitrary code the target system.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-10399)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper handling of property names in property expressions in increment and decrement expressions. A remote authenticated attacker can specify and run sandboxed scripts to execute arbitrary code the target system.


4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-10400)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper handling of subexpressions in increment and decrement expressions not involving actual assignment allowed. A remote authenticated attacker can specify and run sandboxed scripts to execute arbitrary code the target system.


Remediation

Install update from vendor's website.