CVE-2015-8103
- Reference to the description:
- Description:
- The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".
- Last updated date:
- 01/09/2024
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 12/17/2019
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/02/2020
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/02/2020
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 01/28/2021
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 01/09/2024
- Reference url to background
http://packetstormsecurity.com/files/134805/Jenkins-CLI-RMI-Java-Deserialization.html
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 01/09/2024
- Reference url to background
https://jenkins-ci.org/content/mitigating-unauthenticated-remote-code-execution-0-day-jenkins-cli
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 01/09/2024
- Reference url to background