CVE-2023-24422

A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*

History

21 Nov 2024, 07:47

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de omisión de la sandbox que involucra constructores de mapas en Jenkins Script Security Plugin 1228.vd93135a_2fb_25 y versiones anteriores permite a atacantes con permiso para definir y ejecutar scripts de sandbox, incluidos Pipelines, eludir la protección de sandbox y ejecutar código arbitrario en el contexto de la JVM del controlador Jenkins.
References () https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016 - Vendor Advisory () https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016 - Vendor Advisory

Information

Published : 2023-01-26 21:18

Updated : 2025-04-02 15:15


NVD link : CVE-2023-24422

Mitre link : CVE-2023-24422

CVE.ORG link : CVE-2023-24422


JSON object : View

Products Affected

jenkins

  • script_security
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')