CVE-2022-43402: Jenkins Pipeline: Groovy Plugin allows sandbox protection bypass and arbitrary code execution
10
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.22024%
CWE
Published
10/19/2022
Updated
10/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins.workflow:workflow-cps | maven | < 2803.v1a | 2803.v1a_f77ffcc773 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on missing sandbox checks for Groovy's implicit type casts. The workflow-cps plugin's CPS transformer and Groovy sandbox interceptor are the primary components handling script execution security. The CpsTransformer's sanitization logic and GroovyInterceptor's cast handling would directly process these operations. The patched version explicitly adds cast interception, indicating these were the vulnerable points. While exact patch details aren't provided, the advisory's technical description of intercepting implicit casts aligns with modifications to these core sandbox enforcement mechanisms.