Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8103

Опубликовано: 11 нояб. 2015
Источник: redhat
CVSS2: 6.8
EPSS Критический

Описание

The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".

Дополнительная информация

Статус:

Important
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1282371jenkins: Remote code execution vulnerability due to unsafe deserialization in Jenkins remoting (SECURITY-218)

EPSS

Процентиль: 100%
0.90824
Критический

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 10 лет назад

The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".

CVSS3: 9.8
nvd
около 10 лет назад

The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".

CVSS3: 9.8
debian
около 10 лет назад

The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625 ...

CVSS3: 9.8
github
больше 3 лет назад

Jenkins CLI Deserialization of Untrusted Data vulnerability

EPSS

Процентиль: 100%
0.90824
Критический

6.8 Medium

CVSS2