logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2019-1003030

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2019-1003030

Description:
A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.
Last updated date:
07/16/2024

Reports

alt

ACTIVELY EXPLOITED

Type:
exploitation
Confidence:
HIGH
Date of publishing:
09/27/2021
Reference url to background

https://xopero.com/blog/en/2021/09/27/new-malware-tinyturla-and-capoae-fake-certificate-alert-and-dangerous-teamviewer/

Type:
exploitation
Confidence:
HIGH
Date of publishing:
03/25/2022
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/19/2020
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/16/2024
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy