ID:1550 - Exploit for Improper access control in Pipeline: Groovy - CVE-2019-1003001

 
Main Vulnerability Database Exploits ID:1550 - Exploit for Improper access control in Pipeline: Groovy - CVE-2019-1003001

ID:1550 - Exploit for Improper access control in Pipeline: Groovy - CVE-2019-1003001

Published: March 18, 2020


Vulnerability identifier: #VU21572
Vulnerability risk: High
CVE-ID: CVE-2019-1003001
CWE-ID: CWE-284
Exploitation vector: Remote access
Vulnerable software:
Pipeline: Groovy

Link to public exploit:


Vulnerability description

The vulnerability allows a remote attacker to bypass sandbox restrictions.

The vulnerability exists due to improper access restrictions in "src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java" and "src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java" when applying AST transforming annotations such as @Grab to source code elements. A remote authenticated attacker with Overall/Read permission, or able to control Jenkins file or sandboxed Pipeline shared library contents in SCM, can bypass the sandbox protection and execute arbitrary code on the Jenkins master.


Remediation

Install updates from vendor's website.