CVE-2019-1003002
HIGHPipeline: Declarative Plugin <1.3.3 - RCE
Title source: llmDescription
A sandbox bypass vulnerability exists in Pipeline: Declarative Plugin 1.3.3 and earlier in pipeline-model-definition/src/main/groovy/org/jenkinsci/plugins/pipeline/modeldefinition/parser/Converter.groovy that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotejava
https://www.exploit-db.com/exploits/46572
exploitdb
WORKING POC
VERIFIED
by orange · textwebappsjava
https://www.exploit-db.com/exploits/46427
metasploit
WORKING POC
EXCELLENT
by Orange Tsai, Mikhail Egorov, George Noseevich, wvu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/jenkins_metaprogramming.rb
References (6)
Scores
CVSS v3
8.8
EPSS
0.9345
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
Status
published
Products (3)
jenkins/pipeline\
< 1.3.3
org.jenkinsci.plugins/pipeline-model-definition
0 - 1.3.4.1Maven
redhat/openshift_container_platform
3.11
Published
Jan 22, 2019
Tracked Since
Feb 18, 2026