Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2017-1000353 | First vendor Publication | 2018-01-29 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 9.8 | ||
Base Score | 9.8 | Environmental Score | 9.8 |
impact SubScore | 5.9 | Temporal Score | 9.8 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000353 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-502 | Deserialization of Untrusted Data |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2019-11-21 | Jenkins CLI arbitrary Java object deserialization attempt RuleID : 51961 - Revision : 2 - Type : SERVER-WEBAPP |
2018-04-03 | Jenkins Java SignedObject deserialization command execution attempt RuleID : 45790 - Revision : 1 - Type : SERVER-WEBAPP |
Metasploit Database
id | Description |
---|---|
2017-04-26 | Jenkins CLI Deserialization |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-05-04 | Name : A job scheduling and management system hosted on the remote web server is aff... File : jenkins_2_57.nasl - Type : ACT_GATHER_INFO |
2017-04-27 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_631c47109be54a809310eb2847fe24dd.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 13:00:54 |
|
2024-08-02 12:44:20 |
|
2024-08-02 01:12:39 |
|
2024-02-02 01:42:59 |
|
2024-02-01 12:12:06 |
|
2023-09-05 12:41:01 |
|
2023-09-05 01:11:50 |
|
2023-09-02 12:40:48 |
|
2023-09-02 01:12:06 |
|
2023-08-12 12:44:15 |
|
2023-08-12 01:11:36 |
|
2023-08-11 12:38:55 |
|
2023-08-11 01:11:55 |
|
2023-08-06 12:37:38 |
|
2023-08-06 01:11:35 |
|
2023-08-04 12:37:48 |
|
2023-08-04 01:11:39 |
|
2023-07-14 12:37:50 |
|
2023-07-14 01:11:38 |
|
2023-03-29 01:39:36 |
|
2023-03-28 12:11:56 |
|
2022-10-11 12:33:46 |
|
2022-10-11 01:11:34 |
|
2022-06-14 00:27:25 |
|
2022-04-20 09:23:50 |
|
2021-05-04 12:56:09 |
|
2021-04-22 02:08:53 |
|
2020-09-23 05:22:42 |
|
2020-09-22 13:22:41 |
|
2020-09-05 01:16:51 |
|
2020-05-23 02:02:11 |
|
2020-05-23 00:54:29 |
|
2019-07-09 01:08:41 |
|
2019-05-09 12:08:28 |
|
2019-04-25 12:05:24 |
|
2019-02-20 12:08:05 |
|
2018-10-31 01:07:40 |
|
2018-04-06 12:03:08 |
|
2018-03-20 01:04:29 |
|
2018-02-15 17:19:58 |
|
2018-01-31 09:20:34 |
|
2018-01-29 21:20:32 |
|