Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.jenkins-ci.plugins/script-security
  4. ›
  5. CVE-2023-24422

CVE-2023-24422: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

January 26, 2023 (updated February 4, 2023)

A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

References

  • github.com/advisories/GHSA-76qj-9gwh-pvv3
  • nvd.nist.gov/vuln/detail/CVE-2023-24422
  • www.jenkins.io/security/advisory/2023-01-24/

Code Behaviors & Features

Detect and mitigate CVE-2023-24422 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1229.v4880b_b_e905a_6

Fixed versions

  • 1229.v4880b_b_e905a_6

Solution

Upgrade to version 1229.v4880b_b_e905a_6 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

maven/org.jenkins-ci.plugins/script-security/CVE-2023-24422.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:14 +0000.