ID:1550 - Exploit for Improper access control in Pipeline: Groovy - CVE-2019-1003001
Published: March 18, 2020
Pipeline: Groovy
Link to public exploit:
Vulnerability description
The vulnerability allows a remote attacker to bypass sandbox restrictions.
The vulnerability exists due to improper access restrictions in "src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java" and "src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java" when applying AST transforming annotations such as @Grab to source code elements. A remote authenticated attacker with Overall/Read permission, or able to control Jenkins file or sandboxed Pipeline shared library contents in SCM, can bypass the sandbox protection and execute arbitrary code on the Jenkins master.