10
CVE-2018-1000861
- EPSS 94.49%
- Published 10.12.2018 14:29:01
- Last modified 14.03.2025 18:22:36
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.
Data is provided by the National Vulnerability Database (NVD)
10.02.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
Jenkins Stapler Web Framework Deserialization of Untrusted Data Vulnerability
VulnerabilityA code execution vulnerability exists in the Stapler web framework used by Jenkins
DescriptionApply updates per vendor instructions.
Required actionsType | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 94.49% | 1 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.