Critical severityNVD Advisory· Published May 31, 2019· Updated Aug 4, 2024
CVE-2019-10328
CVE-2019-10328
Description
Jenkins Pipeline Remote Loader Plugin 1.4 and earlier provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:workflow-remote-loaderMaven | < 1.5 | 1.5 |
Affected products
1- Range: 1.4 and earlier
Patches
16f9d60f61435[SECURITY-921]
2 files changed · +0 −14
src/main/java/org/jenkinsci/plugins/workflow/remoteloader/FileLoaderDSL.java+0 −12 modified@@ -61,16 +61,4 @@ public static String getSampleSnippet(String name) throws IOException { return IOUtils.toString(scriptStream, "UTF-8"); } - @Extension - public static class MiscWhitelist extends ProxyWhitelist { - - public MiscWhitelist() throws IOException { - super(new StaticWhitelist( - "new java.util.TreeMap", - "method groovy.lang.Closure call java.lang.Object", - "method java.lang.Object toString", - "method groovy.lang.GroovyObject invokeMethod java.lang.String java.lang.Object" - )); - } - } }
src/main/resources/org/jenkinsci/plugins/workflow/remoteloader/FileLoaderDSL/FileLoaderDSLImpl.groovy+0 −2 modified@@ -50,7 +50,6 @@ class FileLoaderDSLImpl implements Serializable { public <V> V withGit(String repoUrl = DEFAULT_REPO_URL, String repoBranch = DEFAULT_BRANCH, String credentialsId = null, labelExpression = '', Closure<V> body) { - Map<String, Object> loaded = new TreeMap<String, Object>() node(labelExpression) { withTimestamper { script.dir(TMP_FOLDER) { @@ -83,7 +82,6 @@ class FileLoaderDSLImpl implements Serializable { public <V> V withSVN(String repoUrl = DEFAULT_REPO_URL, String credentialsId = null, labelExpression = '', Closure<V> body) { - Map<String, Object> loaded = new TreeMap<String, Object>() node(labelExpression) { withTimestamper { script.dir(TMP_FOLDER) {
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- access.redhat.com/errata/RHBA-2019:1605ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:1636ghsavendor-advisoryx_refsource_REDHATWEB
- github.com/advisories/GHSA-v558-fhw2-v46wghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-10328ghsaADVISORY
- www.openwall.com/lists/oss-security/2019/05/31/2ghsamailing-listx_refsource_MLISTWEB
- www.securityfocus.com/bid/108540ghsavdb-entryx_refsource_BIDWEB
- github.com/jenkinsci/workflow-remote-loader-plugin/commit/6f9d60f614359720ec98e22b80ba15e8bf88e712ghsaWEB
- jenkins.io/security/advisory/2019-05-31/ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.