HomePentest-Tools.com Logo

Jenkins - Remote Code Execution (CVE-2018-1000861, CVE-2019-1003005, CVE-2019-1003029) (CVE-2018-1000861, CVE-2019-1003005, CVE-2019-1003029)

Severity
CVSSv3 Score
9.9
Vulnerability description

Jenkins server is affected by a Remote Code Execution vulnerability, located in the Jenkins Script Security Plugin 1.53 and earlier. The root cause of this vulnerability consists in improper sandbox protection in the Script Security Plugin Groovy Sandbox, which allows users with Overall/Read permission(and unauthenticated users when ANONYMOUS_READ is enabled) to bypass the sandbox protection and execute arbitrary code on the Jenkins server.

Risk description

The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware, or pivot to the internal network.

Exploit capabilities

Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.

Recommendation

Upgrade the Jenkins server to the latest version or a version higher than LTS 2.138.3, 2.153.

Codename
Not available
Detectable with
Network Scanner
Exploitable with Sniper
Yes
Vuln date
Mar 2019
Published at
Updated at
Software Type
Automation Server
Vendor
Jenkins
Product
Jenkins