VYPR
High severityNVD Advisory· Published May 2, 2024· Updated Feb 13, 2025

CVE-2024-34145

CVE-2024-34145

Description

A sandbox bypass vulnerability involving sandbox-defined classes that shadow specific non-sandbox-defined classes in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A sandbox bypass vulnerability in Jenkins Script Security Plugin allows attackers with sandbox script permissions to execute arbitrary code on the controller JVM.

Vulnerability

Overview

The Jenkins Script Security Plugin provides a sandbox feature to safely execute low-privilege scripts, including Pipelines. A sandbox bypass vulnerability exists in versions 1335.vf07d9ce377a_e and earlier, where Groovy classes defined inside the sandbox can shadow specific non-sandbox-defined classes [1]. By creating a sandbox-defined class that shadows a class outside the sandbox, an attacker can circumvent the sandbox interceptor and instantiate arbitrary subclassable types, breaking the protection boundaries.

Exploitation

Prerequisites

To exploit this vulnerability, an attacker must have permission to define and run sandboxed scripts, which is typically granted to users with Job/Configure or similar privileges in Jenkins [3]. The attack leverages crafted Groovy code that defines a class with the same fully qualified name as a non-sandbox class, effectively taking advantage of the sandbox's insufficient filtering of shadowed classes [2]. No additional network access or authentication bypass is required beyond the initial script execution capability.

Impact

Successful exploitation allows the attacker to execute arbitrary code in the context of the Jenkins controller JVM [1]. This can lead to full compromise of the Jenkins controller, including access to secrets, credentials, and the ability to manipulate builds, jobs, and configurations. The vulnerability is rated High severity due to the potential for complete system takeover [3].

Mitigation

Jenkins released Script Security Plugin version 1336.vf33a_a_9863911, which adds additional restrictions and sanity checks to prevent super constructor calls and ensures that classes in shadowable packages are no longer ignored by the sandbox [3]. Users should upgrade to this version or later immediately. There are no known workarounds for this vulnerability.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.plugins:script-securityMaven
< 1336.vf33a1336.vf33a

Affected products

8

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1