CVE-2019-1003001

HIGH EXPLOITED

Pipeline: Groovy Plugin <2.61 - RCE

Title source: llm

Description

A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

Exploits (2)

exploitdb WORKING POC
webappsjava
https://www.exploit-db.com/exploits/46427
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotejava
https://www.exploit-db.com/exploits/46572

Scores

CVSS v3 8.8
EPSS 0.9394
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2024-04-15

Classification

Status published

Affected Products (5)

jenkins/pipeline\ < 2.61
redhat/openshift_container_platform
org.jenkins-ci.plugins.workflow/workflow-cps-parent < 2.61.1Maven
org.jenkins-ci.plugins/pipeline-model-definition < 1.3.4.1Maven
org.jenkins-ci.plugins/script-security < 1.50Maven

Timeline

Published Jan 22, 2019
Tracked Since Feb 18, 2026