A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts.
CVE Status: Modified
Attribute | Value |
---|---|
Attack Complexity | HIGH |
Attack Vector | NETWORK |
Availability Impact | NONE |
Base Score | 4.2 |
Base Severity | MEDIUM |
Confidentiality Impact | LOW |
Integrity Impact | LOW |
Privileges Required | LOW |
Scope | UNCHANGED |
User Interaction | NONE |
Vector String | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N |
Exploitability Score | 1.6 |
Impact Score | 2.5 |
Source | [email protected] |
Type | Primary |