{
  "threat_severity" : "Important",
  "public_date" : "2022-05-17T00:00:00Z",
  "bugzilla" : {
    "description" : "plugin: Sandbox bypass vulnerability through implicitly allowlisted platform Groovy files in Pipeline: Groovy Plugin",
    "id" : "2119642",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2119642"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-94",
  "details" : [ "Jenkins Pipeline: Groovy Plugin 2689.v434009a_31b_f1 and earlier allows loading any Groovy source files on the classpath of Jenkins and Jenkins plugins in sandboxed pipelines.", "A flaw was found in Jenkins Groovy Plugin. The plugin allows pipelines to load Groovy source files. The intent is to allow Global Shared Libraries to execute without sandbox protection. The issue is that the plugin allows any Groovy source files bundled with Jenkins core and plugins to be loaded this way and their methods executed. If a suitable Groovy source file is available on the classpath of Jenkins, sandbox protections can be bypassed. No Groovy source files were found in Jenkins core or plugins that could result in attackers executing dangerous code; hence successful exploitation is considered highly unlikely." ],
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 4.8",
    "release_date" : "2023-01-12T00:00:00Z",
    "advisory" : "RHSA-2023:0017",
    "cpe" : "cpe:/a:redhat:openshift:4.8::el8",
    "package" : "jenkins-2-plugins-0:4.8.1672842762-1.el8"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Will not fix",
    "package_name" : "jenkins-2-plugins",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-30945\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-30945\nhttps://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-359" ],
  "name" : "CVE-2022-30945",
  "csaw" : false
}