Jenkins CLI Deserialization of Untrusted Data vulnerability
Critical severity
GitHub Reviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Mar 4, 2024
Package
Affected versions
< 1.625.2
>= 1.626, < 1.638
Patched versions
1.625.2
1.638
Description
Published by the National Vulnerability Database
Nov 25, 2015
Published to the GitHub Advisory Database
May 13, 2022
Reviewed
Jan 9, 2024
Last updated
Mar 4, 2024
The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic
webapps/ROOT/WEB-INF/lib/commons-collections-*.jar
file and the "Groovy variant inysoserial
".References