{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T17:42:22.670","vulnerabilities":[{"cve":{"id":"CVE-2024-34145","sourceIdentifier":"jenkinsci-cert@googlegroups.com","published":"2024-05-02T14:15:10.330","lastModified":"2025-10-10T15:34:23.290","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A sandbox bypass vulnerability involving sandbox-defined classes that shadow specific non-sandbox-defined classes in Jenkins Script Security Plugin 1335.vf07d9ce377a_e and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM."},{"lang":"es","value":"Una vulnerabilidad de omisión de la sandbox que involucra clases definidas en la sandbox que ocultan clases específicas no definidas en la sandbox en Jenkins Script Security Plugin 1335.vf07d9ce377a_e y versiones anteriores permite a atacantes con permiso para definir y ejecutar scripts en la sandbox, incluidos Pipelines, para eludir la protección de la sandbox y ejecutar de forma arbitraria. código en el contexto de la JVM del controlador Jenkins."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-290"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*","versionEndIncluding":"1335.vf07d9ce377a_e","matchCriteriaId":"9DD63447-95AF-4C16-9958-D8742715415F"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2024/05/02/3","source":"jenkinsci-cert@googlegroups.com","tags":["Mailing List"]},{"url":"https://www.jenkins.io/security/advisory/2024-05-02/#SECURITY-3341","source":"jenkinsci-cert@googlegroups.com","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2024/05/02/3","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https://www.jenkins.io/security/advisory/2024-05-02/#SECURITY-3341","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}