{
  "threat_severity" : "Important",
  "public_date" : "2019-11-21T00:00:00Z",
  "bugzilla" : {
    "description" : "jenkins-script-security-plugin: sandbox protection bypass leads to execute arbitrary code in sandboxed scripts",
    "id" : "1819652",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1819652"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-94",
  "details" : [ "A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.67 and earlier related to the handling of default parameter expressions in closures allowed attackers to execute arbitrary code in sandboxed scripts.", "A sandbox bypass flaw was found in the Jenkins Script Security Plugin versions 1.67 and earlier, that are related to the handling of closure default parameter expressions. This flaw allows attackers to execute arbitrary code in sandboxed scripts." ],
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "release_date" : "2020-06-17T00:00:00Z",
    "advisory" : "RHSA-2020:2478",
    "cpe" : "cpe:/a:redhat:openshift:3.11::el7",
    "package" : "jenkins-2-plugins-0:3.11.1591354111-1.el7"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.3",
    "release_date" : "2020-09-09T00:00:00Z",
    "advisory" : "RHSA-2020:3616",
    "cpe" : "cpe:/a:redhat:openshift:4.3::el7",
    "package" : "jenkins-2-plugins-0:4.3.1597915133-1.el7"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.4",
    "release_date" : "2020-06-29T00:00:00Z",
    "advisory" : "RHSA-2020:2737",
    "cpe" : "cpe:/a:redhat:openshift:4.4::el7",
    "package" : "jenkins-2-plugins-0:4.4.1592817009-1.el7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2019-16538\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-16538\nhttps://jenkins.io/security/advisory/2019-11-21/#SECURITY-1658" ],
  "name" : "CVE-2019-16538",
  "csaw" : false
}