-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:simple-travis-runner | maven | <= 1.0 |
The vulnerability stems from the plugin's custom Script Security whitelist overriding Jenkins' default protections. While exact code isn't provided, the advisory explicitly states the plugin defines unsafe pre-approved signatures. In Jenkins, such whitelists are typically implemented via classes extending Whitelist or contributing via @Extension. The high confidence comes from the direct link between the described sandbox bypass mechanism and the plugin's custom whitelist implementation, a common pattern in Jenkins plugin vulnerabilities (e.g., CVE-2019-1003029). The lack of a patch confirms the issue resides in the plugin's core whitelist logic.
Ongoing coverage of React2Shell