Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2015-8103 — Deserialization of Untrusted Data in Jenkins
Severity
9.8CRITICALNVD
EPSS
90.4%
top 0.39%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedNov 25
Latest updateAug 17
Description
The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages1 packages
Also affects: Openshift Container Platform 2.2, 3.1
🔴Vulnerability Details
3💥Exploits & PoCs
4📋Vendor Advisories
2🕵️Threat Intelligence
2📐Framework References
2📄Research Papers
1arXiv▶
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities↗2022-08-17
💬Community
1Bugzilla▶
CVE-2015-8103 jenkins: Remote code execution vulnerability due to unsafe deserialization in Jenkins remoting (SECURITY-218)↗2015-11-16