← Volver a CVEs
CVE-2022-43403
CRITICAL9.9
Descripcion
A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Detalles CVE
Puntuacion CVSS v3.19.9
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado10/19/2022
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
jenkins:script_security
Referencias
http://www.openwall.com/lists/oss-security/2022/10/19/3(jenkinsci-cert@googlegroups.com)
https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%281%29(jenkinsci-cert@googlegroups.com)
https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/(jenkinsci-cert@googlegroups.com)
http://www.openwall.com/lists/oss-security/2022/10/19/3(af854a3a-2127-422b-91ae-364da2661108)
https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%281%29(af854a3a-2127-422b-91ae-364da2661108)
https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.