Описание
RCE vulnerability in Jenkins Yaml Axis Plugin
Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to configure a multi-configuration (Matrix) job, or control the contents of a previously configured job’s SCM repository.
Yaml Axis Plugin 0.2.1 configures its YAML parser to only instantiate safe types.
Пакеты
Наименование
org.jenkins-ci.plugins:yaml-axis
maven
Затронутые версииВерсия исправления
<= 0.2.0
0.2.1
Связанные уязвимости
CVSS3: 8.8
nvd
почти 6 лет назад
Jenkins Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.