Sandbox protection in Script Security Plugin could be circumvented through default parameter expressions in constructors. This allowed attackers able to specify and run sandboxed scripts to execute arbitrary code in the context of the Jenkins master JVM. References: https://jenkins.io/security/advisory/2019-10-01/#SECURITY-1579
Created jenkins-script-security-plugin tracking bugs for this issue: Affects: fedora-all [bug 1764391]
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.2 Via RHSA-2019:4097 https://access.redhat.com/errata/RHSA-2019:4097
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-10431
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2019:4055 https://access.redhat.com/errata/RHSA-2019:4055
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2019:4089 https://access.redhat.com/errata/RHSA-2019:4089
External References: https://jenkins.io/security/advisory/2019-10-01/#SECURITY-1579