Description
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.
Remediation
References
https://jenkins.io/security/advisory/2019-10-01/#SECURITY-1579
http://www.openwall.com/lists/oss-security/2019/10/01/2
https://access.redhat.com/errata/RHSA-2019:4097
https://access.redhat.com/errata/RHSA-2019:4055
https://access.redhat.com/errata/RHSA-2019:4089
Related Vulnerabilities
CVE-2021-41182 Vulnerability in maven package org.webjars.bower:jquery-ui
CVE-2022-27263 Vulnerability in npm package strapi
CVE-2021-42567 Vulnerability in maven package org.apereo.cas:cas-server-core-services
CVE-2023-24057 Vulnerability in maven package ca.uhn.hapi.fhir:org.hl7.fhir.r4b
CVE-2021-30246 Vulnerability in maven package org.webjars.npm:jsrsasign