CVE-2019-1003001
HIGH EXPLOITEDPipeline: Groovy Plugin <2.61 - RCE
Title source: llmDescription
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotejava
https://www.exploit-db.com/exploits/46572
References (6)
Scores
CVSS v3
8.8
EPSS
0.9394
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2024-04-15
Classification
Status
published
Affected Products (5)
jenkins/pipeline\
< 2.61
redhat/openshift_container_platform
org.jenkins-ci.plugins.workflow/workflow-cps-parent
< 2.61.1Maven
org.jenkins-ci.plugins/pipeline-model-definition
< 1.3.4.1Maven
org.jenkins-ci.plugins/script-security
< 1.50Maven
Timeline
Published
Jan 22, 2019
Tracked Since
Feb 18, 2026