CVE-2017-1000353

9.8
CVSS
CRITICAL
EPSS94.5%(100th)
CISA KEVPublic ExploitExploited in Wild
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI...

🔴Vulnerability Details

4
GHSA
Deserialization of Untrusted Data in Jenkins2022-05-13
OSV
Deserialization of Untrusted Data in Jenkins2022-05-13
CVEList
CVE-2017-1000353: Jenkins versions 22018-01-29
VulnCheck
Jenkins Remote Code Execution Vulnerability2017

💥Exploits & PoCs

2
Exploit-DB
CloudBees Jenkins 2.32.1 - Java Deserialization2017-05-05
Nuclei
Jenkins CLI - Java Deserialization

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Possible Jenkins CLI RCE (CVE-2017-1000353)2018-02-21

📋Vendor Advisories

4
CISA
Jenkins Remote Code Execution Vulnerability2025-10-02
Jenkins
Jenkins Security Advisory 2017-04-262017-04-26
Red Hat
jenkins: Unauthenticated remote code execution (SECURITY-429)2017-04-26
Oracle
Oracle Critical Patch Update - APR 2022

💬Community

2
FullDisc
https://blogs.securiteam.com/index.php/archives/31712017-05-03
MailList
Multiple vulnerabilities in Jenkins2017-04-26