CVE-2019-1003000

HIGH EXPLOITED NUCLEI

Script Security Plugin <1.49 - RCE

Title source: llm

Description

A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java that allows attackers with the ability to provide sandboxed scripts to execute arbitrary code on the Jenkins master JVM.

Exploits (10)

nomisec WORKING POC 316 stars
by adamyordan · remote-auth
https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc
nomisec WORKING POC 75 stars
by wetw0rk · poc
https://github.com/wetw0rk/Exploit-Development
nomisec WORKING POC 4 stars
by 1NTheKut · remote
https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION
nomisec WORKING POC 1 stars
by purple-WL · poc
https://github.com/purple-WL/Jenkins_CVE-2019-1003000
nomisec WRITEUP
by andikahilmy · poc
https://github.com/andikahilmy/CVE-2019-1003000-script-security-plugin-vulnerable
nomisec WORKING POC
by slowmistio · remote
https://github.com/slowmistio/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins
exploitdb WORKING POC
webappsjava
https://www.exploit-db.com/exploits/46427
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotejava
https://www.exploit-db.com/exploits/46572
exploitdb WORKING POC
by wetw0rk · pythonwebappsjava
https://www.exploit-db.com/exploits/46453

Nuclei Templates (1)

Jenkins Script Security Plugin <=1.49 - Sandbox Bypass
HIGHVERIFIEDby sttlr

Scores

CVSS v3 8.8
EPSS 0.9444
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2020-01-31

Classification

Status published

Affected Products (3)

jenkins/script_security < 1.49
redhat/openshift_container_platform
org.jenkins-ci.plugins/script-security < 1.50Maven

Timeline

Published Jan 22, 2019
Tracked Since Feb 18, 2026