Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-10328
Modified
More InfoOfficial Page
Source-jenkinsci-cert@googlegroups.com
View Known Exploited Vulnerability (KEV) details
Published At-31 May, 2019 | 15:29
Updated At-25 Oct, 2023 | 18:16

Jenkins Pipeline Remote Loader Plugin 1.4 and earlier provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.09.9CRITICAL
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Primary2.06.5MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
CPE Matches

Jenkins
jenkins
>>pipeline_remote_loader>>Versions up to 1.4(inclusive)
cpe:2.3:a:jenkins:pipeline_remote_loader:*:*:*:*:*:jenkins:*:*
Weaknesses
CWE IDTypeSource
CWE-693Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2019/05/31/2jenkinsci-cert@googlegroups.com
N/A
http://www.securityfocus.com/bid/108540jenkinsci-cert@googlegroups.com
N/A
https://access.redhat.com/errata/RHBA-2019:1605jenkinsci-cert@googlegroups.com
N/A
https://access.redhat.com/errata/RHSA-2019:1636jenkinsci-cert@googlegroups.com
N/A
https://jenkins.io/security/advisory/2019-05-31/#SECURITY-921jenkinsci-cert@googlegroups.com
Vendor Advisory
Change History
0Changes found

Details not found