HomePentest-Tools.com Logo

Jenkins - Remote Code Execution (CVE-2018-1000861, CVE-2019-1003005, CVE-2019-1003029)

Severity
CVSSv3 Score
9.9
Exploitable with Sniper
Yes
Vulnerability description

Jenkins server is affected by a Remote Code Execution vulnerability, located in the Jenkins Script Security Plugin 1.53 and earlier. The root cause of this vulnerability consists in improper sandbox protection in the Script Security Plugin Groovy Sandbox, which allows users with Overall/Read permission(and unauthenticated users when ANONYMOUS_READ is enabled) to bypass the sandbox protection and execute arbitrary code on the Jenkins server.

Exploit capabilities

Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.

Risk description

The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware, or pivot to the internal network.

Recommendation

Upgrade the Jenkins server to the latest version or a version higher than LTS 2.138.3, 2.153.

Detectable with
Network Scanner
Vuln date
Mar 2019
Published at
Updated at
Software Type
Automation Server
Vendor
Jenkins
Product
Jenkins
Codename
Not available