Jenkins < 1.638 / 1.625.2 Java Object Deserialization RCE

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.

Synopsis :

The remote web server is affected by a remote code execution

Description :

The remote web server hosts a version of Jenkins or Jenkins Enterprise
that is prior to 1.638 or 1.625.2. It is, therefore, affected by a
flaw in the Apache Commons Collections (ACC) library that allows the
deserialization of unauthenticated Java objects. An unauthenticated,
remote attacker can exploit this to execute arbitrary code on the
target host.

See also :

Solution :

Upgrade to Jenkins version 1.638 / 1.625.2 or later. Alternatively,
disable the CLI port per the vendor advisory.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true

Family: General

Nessus Plugin ID: 86898 ()

Bugtraq ID: 77636

CVE ID: CVE-2015-8103

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now