#VU17916 Security restrictions bypass in Email Extension
Published: March 7, 2019 / Updated: March 7, 2019
Email Extension
Jenkins
Description
The vulnerability allows a remote attacker to execute arbitrary code on the vulnerable server.
The vulnerability exists due to an error when parsing, compiling or instantiating a Groovy script within the supported functionality for sandboxed Groovy expressions. A remote attacker with the ability to control the plugin’s job-specific configuration can supply a specially crafted Groovy script, bypass the sandbox protection and execute arbitrary code on the Jenkins master.
Successful exploitation of the vulnerability may allow an attacker to compromise the affected server.