Critical severityNVD Advisory· Published Sep 25, 2019· Updated Aug 4, 2024
CVE-2019-10417
CVE-2019-10417
Description
Jenkins Kubernetes :: Pipeline :: Kubernetes Steps Plugin provides a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
io.fabric8.pipeline:kubernetes-pipeline-stepsMaven | <= 1.6 | — |
Affected products
1- Range: 1.6 and earlier
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-ccxh-j7hg-m5mrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-10417ghsaADVISORY
- www.openwall.com/lists/oss-security/2019/09/25/3ghsamailing-listx_refsource_MLISTWEB
- github.com/jenkinsci/kubernetes-pipeline-plugin/blob/master/kubernetes-stepsghsaPACKAGE
- jenkins.io/security/advisory/2019-09-25/mitrex_refsource_CONFIRM
- jenkins.io/security/advisory/2019-09-25/ghsaWEB
News mentions
0No linked articles in our index yet.