Bug 1819713 (CVE-2019-10399) - CVE-2019-10399 jenkins-script-security-plugin: handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts
Summary: CVE-2019-10399 jenkins-script-security-plugin: handling of property names in ...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2019-10399
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1819714
Blocks: 1819655
TreeView+ depends on / blocked
 
Reported: 2020-04-01 11:08 UTC by Dhananjay Arunesh
Modified: 2021-02-16 20:20 UTC (History)
14 users (show)

Fixed In Version: jenkins-script-security-plugin 1.63
Clone Of:
Environment:
Last Closed: 2020-04-02 04:31:57 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2020-04-01 11:08:50 UTC
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.

Reference:
http://www.openwall.com/lists/oss-security/2019/09/12/2

Comment 1 Dhananjay Arunesh 2020-04-01 11:09:43 UTC
Created jenkins-script-security-plugin tracking bugs for this issue:

Affects: fedora-30 [bug 1819714]

Comment 2 Sam Fowler 2020-04-02 01:47:29 UTC
External References:

https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538

Comment 3 Sam Fowler 2020-04-02 01:48:14 UTC
Fixed in OpenShift Container Platform 3.11 in the below advisory:

https://access.redhat.com/errata/RHSA-2019:4055

Comment 4 Sam Fowler 2020-04-02 01:55:17 UTC
Fixed in OpenShift Container Platform 4.2 in the below advisory:

https://access.redhat.com/errata/RHSA-2019:4097

Comment 5 Product Security DevOps Team 2020-04-02 04:31:57 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-10399


Note You need to log in before you can comment on or make changes to this bug.