TROYANOSYVIRUS
Retour aux CVEs

CVE-2017-1000353

CRITICALCISA KEV
9.8

Description

Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie1/29/2018
Derniere modification11/5/2025
Sourcekev
Observations honeypot0

CISA KEV

FournisseurJenkins
ProduitJenkins
Nom vulnerabiliteJenkins Remote Code Execution Vulnerability
Date ajout KEV2025-10-02
Date limite remediation2025-10-23
Utilise dans ransomwareUnknown

Produits affectes

jenkins:jenkinsoracle:communications_cloud_native_core_automated_test_suite

Faiblesses (CWE)

CWE-502CWE-502

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.