A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://jenkins.io/security/advisory/2018-12-05/#SECURITY-595 | vendor advisory |
https://access.redhat.com/errata/RHBA-2019:0024 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/106176 | vdb entry broken link |
http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html | vdb entry third party advisory |