Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hhpm-5cp2-hg4x

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Deserialization of Untrusted Data in Jenkins

A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.

Пакеты

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

<= 2.138.3

2.138.4

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

>= 2.140, <= 2.153

2.154

EPSS

Процентиль: 100%
0.94467
Критический

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 8.8
redhat
около 7 лет назад

A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.

CVSS3: 9.8
nvd
около 7 лет назад

A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.

CVSS3: 9.8
debian
около 7 лет назад

A code execution vulnerability exists in the Stapler web framework use ...

CVSS3: 9.8
fstec
около 7 лет назад

Уязвимость функции в stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java компонента Stapler сервера автоматизации Jenkins, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94467
Критический

9.8 Critical

CVSS3

Дефекты

CWE-502