Jenkins Security Advisory 2018-10-29

This advisory announces vulnerabilities in the following Jenkins deliverables:


Sandbox Bypass in Script Security and Pipeline Groovy Plugins

SECURITY-1186 / CVE-2018-1000865 (Script Security Plugin) and CVE-2018-1000866 (Pipeline: Groovy Plugin)
Severity (CVSS): high
Affected plugins: script-security , workflow-cps

The Groovy Sandbox library used by Script Security Plugin and Pipeline Groovy Plugin did not apply sandbox restrictions to finalize methods. This could be used to invoke arbitrary constructors and methods, bypassing sandbox protection.

Finalize methods are now prohibited in classes subject to sandbox security.

This may result in existing sandboxed scripts, such as pipelines, starting to fail if they use this language feature.


Affected Versions

  • Pipeline: Groovy Plugin up to and including 2.59
  • Script Security Plugin up to and including 1.47


  • Pipeline: Groovy Plugin should be updated to version 2.60
  • Script Security Plugin should be updated to version 1.48

These versions include fixes to the vulnerabilities described above. All prior versions are considered to be affected by these vulnerabilities unless otherwise indicated.


The Jenkins project would like to thank the reporters for discovering and reporting these vulnerabilities:

  • Man Yue Mo of Semmle Security Research Team for SECURITY-1186