Jenkins Code Coverage API Plugin 1.4.0 and earlier does not apply Jenkins JEP-200 deserialization protection to Java objects it deserializes from disk, resulting in a remote code execution vulnerability.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://www.jenkins.io/security/advisory/2021-08-31/#SECURITY-2376 | vendor advisory |
http://www.openwall.com/lists/oss-security/2021/08/31/1 | third party advisory mailing list |