Jenkins Security Advisory 2018-10-29

This advisory announces vulnerabilities in the following Jenkins deliverables:

Descriptions

Sandbox Bypass in Script Security and Pipeline Groovy Plugins

SECURITY-1186 / CVE-2018-1000865 (Script Security Plugin) and CVE-2018-1000866 (Pipeline: Groovy Plugin)
Severity (CVSS): high
Affected plugins: script-security , workflow-cps
Description:

The Groovy Sandbox library used by Script Security Plugin and Pipeline Groovy Plugin did not apply sandbox restrictions to finalize methods. This could be used to invoke arbitrary constructors and methods, bypassing sandbox protection.

Finalize methods are now prohibited in classes subject to sandbox security.

This may result in existing sandboxed scripts, such as pipelines, starting to fail if they use this language feature.

Severity

Affected Versions

  • Pipeline: Groovy Plugin up to and including 2.59
  • Script Security Plugin up to and including 1.47

Fix

  • Pipeline: Groovy Plugin should be updated to version 2.60
  • Script Security Plugin should be updated to version 1.48

These versions include fixes to the vulnerabilities described above. All prior versions are considered to be affected by these vulnerabilities unless otherwise indicated.

Credit

The Jenkins project would like to thank the reporters for discovering and reporting these vulnerabilities:

  • Man Yue Mo of Semmle Security Research Team for SECURITY-1186