Loading HuntDB...

GHSA-xfwj-2f34-32f5

GitHub Security Advisory

Jenkins Groovy Plugin sandbox bypass vulnerability

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

A sandbox bypass vulnerability exists in Jenkins Groovy Plugin 2.0 and earlier in `src/main/java/hudson/plugins/groovy/StringScriptSource.java` that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM. In version 2.1, the affected HTTP endpoint applies a safe Groovy compiler configuration preventing the use of unsafe AST transforming annotations.

Affected Packages

Maven org.jenkins-ci.plugins:groovy
Affected versions: 0 (fixed in 2.1)

Related CVEs

Key Information

GHSA ID
GHSA-xfwj-2f34-32f5
Published
May 13, 2022 1:15 AM
Last Modified
December 6, 2022 9:53 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:groovy
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 1, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.