Jenkins < 1.638 / 1.625.2 Java Object Deserialization RCE

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote web server is affected by a remote code execution
vulnerability.

Description :

The remote web server hosts a version of Jenkins or Jenkins Enterprise
that is prior to 1.638 or 1.625.2. It is, therefore, affected by a
flaw in the Apache Commons Collections (ACC) library that allows the
deserialization of unauthenticated Java objects. An unauthenticated,
remote attacker can exploit this to execute arbitrary code on the
target host.

See also :

http://www.nessus.org/u?0316bc02
http://www.nessus.org/u?e0204f30
https://github.com/jenkinsci-cert/SECURITY-218
https://issues.apache.org/jira/browse/COLLECTIONS-580

Solution :

Upgrade to Jenkins version 1.638 / 1.625.2 or later. Alternatively,
disable the CLI port per the vendor advisory.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: General

Nessus Plugin ID: 86898 ()

Bugtraq ID: 77636

CVE ID: CVE-2015-8103

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now