A sandbox bypass vulnerability involving sandbox-defined classes that shadow specific non-sandbox-defined classes in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jenkins
Jenkins script Security |
|
CPEs | cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:* | |
Vendors & Products |
Jenkins
Jenkins script Security |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-02-13T17:52:25.384Z
Reserved: 2024-04-30T20:53:08.612Z
Link: CVE-2024-34145

Updated: 2024-08-02T02:43:00.455Z

Status : Awaiting Analysis
Published: 2024-05-02T14:15:10.330
Modified: 2024-11-21T09:18:11.417
Link: CVE-2024-34145
