CVE-2019-1003030

CRITICAL KEV

Jenkins Pipeline: Groovy Plugin <2.63 - RCE

Title source: llm

Description

A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.

Exploits (2)

nomisec WORKING POC 1 stars
by overgrowncarrot1 · remote
https://github.com/overgrowncarrot1/CVE-2019-1003030
exploitdb WORKING POC
by Daniel Morris · textwebappsjava
https://www.exploit-db.com/exploits/48904

Scores

CVSS v3 9.9
EPSS 0.9305
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-03-25
VulnCheck KEV 2021-10-13
InTheWild.io 2021-09-27
ENISA EUVD EUVD-2022-5117

Classification

CWE
CWE-693
Status published

Affected Products (3)

jenkins/pipeline\ < 2.63
redhat/openshift_container_platform
org.jenkins-ci.plugins.workflow/workflow-cps < 2.64Maven

Timeline

Published Mar 08, 2019
KEV Added Mar 25, 2022
Tracked Since Feb 18, 2026