Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-8103

Опубликовано: 25 нояб. 2015
Источник: ubuntu
Приоритет: medium
EPSS Критический
CVSS2: 7.5
CVSS3: 9.8

Описание

The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

DNE

trusty/esm

DNE

upstream

released

1.6.38, 1.625.2
vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

EPSS

Процентиль: 100%
0.90824
Критический

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

redhat
около 10 лет назад

The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".

CVSS3: 9.8
nvd
около 10 лет назад

The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".

CVSS3: 9.8
debian
около 10 лет назад

The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625 ...

CVSS3: 9.8
github
больше 3 лет назад

Jenkins CLI Deserialization of Untrusted Data vulnerability

EPSS

Процентиль: 100%
0.90824
Критический

7.5 High

CVSS2

9.8 Critical

CVSS3