← Zuruck zu CVEs
CVE-2018-1000861
CRITICALCISA KEV9.8
Beschreibung
A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht12/10/2018
Zuletzt geandert11/5/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerJenkins
ProduktJenkins Stapler Web Framework
SchwachstellennameJenkins Stapler Web Framework Deserialization of Untrusted Data Vulnerability
KEV Aufnahmedatum2022-02-10
Behebungsfrist2022-08-10
Ransomware-NutzungUnknown
Betroffene Produkte
jenkins:jenkinsredhat:openshift_container_platform
Schwachen (CWE)
CWE-502CWE-502
Referenzen
http://www.securityfocus.com/bid/106176(cve@mitre.org)
https://access.redhat.com/errata/RHBA-2019:0024(cve@mitre.org)
http://packetstormsecurity.com/files/166778/Jenkins-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/106176(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHBA-2019:0024(af854a3a-2127-422b-91ae-364da2661108)
https://jenkins.io/security/advisory/2018-12-05/#SECURITY-595(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-1000861(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.