A sandbox bypass vulnerability involving crafted constructor bodies in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jenkins
Jenkins script Security |
|
CPEs | cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:* | |
Vendors & Products |
Jenkins
Jenkins script Security |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-02-13T17:52:24.865Z
Reserved: 2024-04-30T20:53:08.611Z
Link: CVE-2024-34144

Updated: 2024-08-02T02:42:59.914Z

Status : Awaiting Analysis
Published: 2024-05-02T14:15:10.280
Modified: 2024-11-21T09:18:11.227
Link: CVE-2024-34144
