#VU21572 Improper access control in Pipeline: Groovy - CVE-2019-1003001

 

#VU21572 Improper access control in Pipeline: Groovy - CVE-2019-1003001

Published: October 7, 2019


Vulnerability identifier: #VU21572
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2019-1003001
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
Pipeline: Groovy
Software vendor:
Jenkins

Description

The vulnerability allows a remote attacker to bypass sandbox restrictions.

The vulnerability exists due to improper access restrictions in "src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java" and "src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java" when applying AST transforming annotations such as @Grab to source code elements. A remote authenticated attacker with Overall/Read permission, or able to control Jenkins file or sandboxed Pipeline shared library contents in SCM, can bypass the sandbox protection and execute arbitrary code on the Jenkins master.


Remediation

Install updates from vendor's website.

External links