Jenkins Splunk Plugin has a form validation HTTP endpoint used to validate a user-submitted Groovy script through compilation, which was not subject to sandbox protection. This allowed attackers with Overall/Read access to execute arbitrary code on the Jenkins controller by applying AST transforming annotations such as @Grab to source code elements.
The affected HTTP endpoint now applies a safe Groovy compiler configuration preventing the use of unsafe AST transforming annotations.
{
"nvd_published_at": "2019-08-28T16:15:00Z",
"severity": "HIGH",
"github_reviewed_at": "2023-10-26T23:01:32Z",
"github_reviewed": true,
"cwe_ids": []
}