Jenkins - Remote Code Execution (CVE-2018-1000861, CVE-2019-1003005, CVE-2019-1003029) (CVE-2018-1000861, CVE-2019-1003005, CVE-2019-1003029)
- Severity
- CVSSv3 Score
- 9.9
- Vulnerability description
Jenkins server is affected by a Remote Code Execution vulnerability, located in the Jenkins Script Security Plugin 1.53 and earlier. The root cause of this vulnerability consists in improper sandbox protection in the Script Security Plugin Groovy Sandbox, which allows users with Overall/Read permission(and unauthenticated users when ANONYMOUS_READ is enabled) to bypass the sandbox protection and execute arbitrary code on the Jenkins server.
- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware, or pivot to the internal network.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Recommendation
Upgrade the Jenkins server to the latest version or a version higher than LTS 2.138.3, 2.153.
- References
https://nvd.nist.gov/vuln/detail/CVE-2019-1003029
https://www.jenkins.io/security/advisory/2019-03-06
https://nvd.nist.gov/vuln/detail/CVE-2019-1003005
https://www.jenkins.io/security/advisory/2019-01-28
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Mar 2019
- Published at
- Updated at
- Software Type
- Automation Server
- Vendor
- Jenkins
- Product
- Jenkins