ID:5663 - Exploit for Security restrictions bypass in Pipeline: Groovy - CVE-2019-1003030
Published: June 17, 2021
Pipeline: Groovy
Link to public exploit:
Vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the vulnerable server.
The vulnerability exists in "pom.xml" and "src/mai/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java" due to an error when parsing, compiling or instantiating a Groovy script. A remote attacker with the ability to control the contents of a pipeline can supply a specially crafted Groovy script, bypass the sandbox protection and execute arbitrary code on the Jenkins master.
Successful exploitation of the vulnerability may allow an attacker to compromise the affected server.