Description
A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.
Remediation
References
http://packetstormsecurity.com/files/159603/Jenkins-2.63-Sandbox-Bypass.html
http://www.securityfocus.com/bid/107476
https://access.redhat.com/errata/RHSA-2019:0739
https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%282%29
Related Vulnerabilities
CVE-2020-12827 Vulnerability in maven package org.webjars.npm:mjml
CVE-2023-3432 Vulnerability in maven package net.sourceforge.plantuml:plantuml
CVE-2022-26183 Vulnerability in npm package pnpm
CVE-2020-28480 Vulnerability in maven package org.webjars.bower:jointjs
CVE-2023-46122 Vulnerability in maven package org.scala-sbt:sbt