CVE-2024-34144
Description
A sandbox bypass vulnerability involving crafted constructor bodies in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A sandbox bypass vulnerability in Jenkins Script Security Plugin allows attackers to execute arbitrary code by crafting constructor bodies that invoke other constructors.
Vulnerability
Overview
CVE-2024-34144 is a sandbox bypass vulnerability in the Jenkins Script Security Plugin, affecting versions 1335.vf07d9ce377a_e and earlier [1]. The official Jenkins advisory describes that crafted constructor bodies can be used to invoke other constructors in a way that bypasses the sandbox's interception mechanism [4]. This occurs because the sandbox does not properly intercept calls made to other constructors using 'this' within a constructor body [4].
Exploitation
Details
An attacker must have permission to define and run sandboxed scripts, including Pipeline scripts [2]. The Script Security Plugin is designed to allow low-privileged users to define scripts that are generally safe to execute, with the sandbox intercepting calls to various API elements and checking allowlists [4]. However, by crafting a constructor body that invokes other constructors via implicit casts, an attacker can construct any subclassable type and execute arbitrary code [4].
Impact
Successful exploitation allows an attacker to bypass the sandbox protection entirely and execute arbitrary code in the context of the Jenkins controller JVM [2]. This means the attacker can perform any action the Jenkins controller can, including changing security settings, running shell commands, or accessing sensitive data [1].
Mitigation
The vulnerability is fixed in Script Security Plugin version 1336.vf33a_a_9863911 [3]. The fix adds additional restrictions and sanity checks to ensure that super constructors cannot be constructed without being intercepted by the sandbox [4]. Specifically, calls to other constructors using 'this' are now intercepted, and classes in packages that can be shadowed by Groovy-defined classes are no longer ignored by the sandbox when intercepting super constructor calls [4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:script-securityMaven | < 1336.vf33a | 1336.vf33a |
Affected products
8- osv-coords7 versionspkg:apk/chainguard/jenkinspkg:apk/chainguard/jenkins-compatpkg:apk/chainguard/jenkins-remotingpkg:apk/wolfi/jenkinspkg:apk/wolfi/jenkins-compatpkg:apk/wolfi/jenkins-remotingpkg:maven/org.jenkins-ci.plugins/script-security
< 2.458-r0+ 6 more
- (no CPE)range: < 2.458-r0
- (no CPE)range: < 2.458-r0
- (no CPE)range: < 2.458-r0
- (no CPE)range: < 2.458-r0
- (no CPE)range: < 2.458-r0
- (no CPE)range: < 2.458-r0
- (no CPE)range: < 1336.vf33a
- Jenkins Project/Jenkins Script Security Pluginv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-v63g-v339-2673ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-34144ghsaADVISORY
- www.jenkins.io/security/advisory/2024-05-02/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2024/05/02/3ghsaWEB
- github.com/jenkinsci/script-security-plugin/releases/tag/1336.vf33a_a_9863911ghsaWEB
News mentions
1- Jenkins Security Advisory 2024-05-02Jenkins Security Advisories · May 2, 2024