Vulnerability Details CVE-2019-1003040
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.55 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.018
EPSS Ranking 82.8%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2019-1003040
-
cpe:2.3:a:jenkins:script_security:1.0
-
cpe:2.3:a:jenkins:script_security:1.1
-
cpe:2.3:a:jenkins:script_security:1.10
-
cpe:2.3:a:jenkins:script_security:1.11
-
cpe:2.3:a:jenkins:script_security:1.12
-
cpe:2.3:a:jenkins:script_security:1.13
-
cpe:2.3:a:jenkins:script_security:1.14
-
cpe:2.3:a:jenkins:script_security:1.15
-
cpe:2.3:a:jenkins:script_security:1.16
-
cpe:2.3:a:jenkins:script_security:1.17
-
cpe:2.3:a:jenkins:script_security:1.18
-
cpe:2.3:a:jenkins:script_security:1.18.1
-
cpe:2.3:a:jenkins:script_security:1.19
-
cpe:2.3:a:jenkins:script_security:1.2
-
cpe:2.3:a:jenkins:script_security:1.20
-
cpe:2.3:a:jenkins:script_security:1.21
-
cpe:2.3:a:jenkins:script_security:1.22
-
cpe:2.3:a:jenkins:script_security:1.23
-
cpe:2.3:a:jenkins:script_security:1.24
-
cpe:2.3:a:jenkins:script_security:1.25
-
cpe:2.3:a:jenkins:script_security:1.26
-
cpe:2.3:a:jenkins:script_security:1.27
-
cpe:2.3:a:jenkins:script_security:1.28
-
cpe:2.3:a:jenkins:script_security:1.29
-
cpe:2.3:a:jenkins:script_security:1.29.1
-
cpe:2.3:a:jenkins:script_security:1.3
-
cpe:2.3:a:jenkins:script_security:1.30
-
cpe:2.3:a:jenkins:script_security:1.31
-
cpe:2.3:a:jenkins:script_security:1.32
-
cpe:2.3:a:jenkins:script_security:1.33
-
cpe:2.3:a:jenkins:script_security:1.34
-
cpe:2.3:a:jenkins:script_security:1.35
-
cpe:2.3:a:jenkins:script_security:1.36
-
cpe:2.3:a:jenkins:script_security:1.37
-
cpe:2.3:a:jenkins:script_security:1.38
-
cpe:2.3:a:jenkins:script_security:1.39
-
cpe:2.3:a:jenkins:script_security:1.4
-
cpe:2.3:a:jenkins:script_security:1.40
-
cpe:2.3:a:jenkins:script_security:1.41
-
cpe:2.3:a:jenkins:script_security:1.42
-
cpe:2.3:a:jenkins:script_security:1.43
-
cpe:2.3:a:jenkins:script_security:1.44
-
cpe:2.3:a:jenkins:script_security:1.44.1
-
cpe:2.3:a:jenkins:script_security:1.45
-
cpe:2.3:a:jenkins:script_security:1.46
-
cpe:2.3:a:jenkins:script_security:1.46.1
-
cpe:2.3:a:jenkins:script_security:1.47
-
cpe:2.3:a:jenkins:script_security:1.48
-
cpe:2.3:a:jenkins:script_security:1.49
-
cpe:2.3:a:jenkins:script_security:1.5
-
cpe:2.3:a:jenkins:script_security:1.50
-
cpe:2.3:a:jenkins:script_security:1.51
-
cpe:2.3:a:jenkins:script_security:1.52
-
cpe:2.3:a:jenkins:script_security:1.53
-
cpe:2.3:a:jenkins:script_security:1.54
-
cpe:2.3:a:jenkins:script_security:1.54.1
-
cpe:2.3:a:jenkins:script_security:1.54.2
-
cpe:2.3:a:jenkins:script_security:1.54.3
-
cpe:2.3:a:jenkins:script_security:1.54.4
-
cpe:2.3:a:jenkins:script_security:1.55
-
cpe:2.3:a:jenkins:script_security:1.6
-
cpe:2.3:a:jenkins:script_security:1.7
-
cpe:2.3:a:jenkins:script_security:1.8
-
cpe:2.3:a:jenkins:script_security:1.9
-
cpe:2.3:a:redhat:openshift_container_platform:3.11