V
Scaner-VSvulnerability catalog · v4.2
CVE-2024-34144
ANC
HighConfirmedExploit available

A sandbox bypass vulnerability involving crafted constructor bodies in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier all…

CVSS
8.8
High
EPSS
0.50
p97
Published
2024-01-01
Updated
2024-01-01
Description

A sandbox bypass vulnerability involving crafted constructor bodies in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

Tags · CWE
CWE-693
CAPEC-1
CAPEC-17
CAPEC-20
CAPEC-22
CAPEC-36
CAPEC-51
CAPEC-57
CAPEC-59
CAPEC-65
CAPEC-74
CAPEC-87
CAPEC-107
CAPEC-127
CAPEC-237
CAPEC-477
CAPEC-480
CAPEC-668
Affected products
Script_security ≤ 1335.vf07d9ce377a_e
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Timeline
2024-01-01
Published
2024-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: N
Network (N)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: L
Low (L)
User Interaction
UI: N
None (N)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: H
High (H)
Availability Impact
A: H
High (H)
Exploit indicators
EPSS
0.501 · p97
Known exploited (KEV)
No
MITRE ATT&CK
Inferred via CAPEC
└ via CAPEC-57 · CWE-693
└ via CAPEC-127 · CWE-693
└ via CAPEC-668 · CWE-693
└ via CAPEC-480 · CWE-693
Known exploits — Сканер-ВС
CVE-2024-34144
github-poc · https://github.com/MXWXZ/CVE-2024-34144
Enterprise
Affected software
ProductVendorStatus
Tracked
jenkinsTracked
jenkinsTracked
jenkinsTracked
jenkinsTracked
jenkinsTracked
jenkins-2-pluginsTracked
jenkins-2-pluginsTracked
jenkins-2-pluginsTracked
jenkins-2-pluginsTracked
jenkins-2-pluginsTracked
script_security*Tracked
Source databases
ANC
CVE
RED