CloudBees Jenkins Arbitrary Code Execution Vulnerability (CVE-2015-8103)
CloudBees Jenkins Arbitrary Code Execution Vulnerability (CVE-2015-8103)
Release date:
Updated on:
Affected Systems:
CloudBees Jenkins <LTS 1.625.2
CloudBees Jenkins <1.638
Description:
Bugtraq id: 77636
CVE (CAN) ID: CVE-2015-8103
CloudBees Jenkins is an open-source continuous Integration Server.
In versions earlier than CloudBees Jenkins 1.638 and LTS 1.625.2, the Jenkins CLI subsystem has a security vulnerability. By constructing Java objects, these objects are related to problematic webapps/ROOT/WEB-INF/lib/commons-collections -*. jar file and "Groovy variant in 'ysoserial '", remote attackers can execute arbitrary code.
<* Source: Jenkins
*>
Suggestion:
Vendor patch:
CloudBees
---------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11
Https://jenkins-ci.org/content/mitigating-unauthenticated-remote-code-execution-0-day-jenkins-cli
This article permanently updates the link address: