Description
A sandbox bypass vulnerability exists in Jenkins Groovy Plugin 2.0 and earlier in src/main/java/hudson/plugins/groovy/StringScriptSource.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
Remediation
References
https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1293
Related Vulnerabilities
CVE-2023-50719 Vulnerability in maven package org.xwiki.platform:xwiki-platform-search-solr-api
CVE-2019-10429 Vulnerability in maven package org.jenkins-ci.plugins:gitlab-logo
CVE-2020-9489 Vulnerability in maven package org.apache.tika:tika-parsers
CVE-2023-36542 Vulnerability in maven package org.apache.nifi:nifi-cdc-mysql-processors
CVE-2022-36893 Vulnerability in maven package org.jenkins-ci.plugins:rpmsign-plugin