Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-1000353
HistoryJan 29, 2018 - 12:00 a.m.

CVE-2017-1000353

2018-01-2900:00:00
ubuntu.com
ubuntu.com
24

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.971 High

EPSS

Percentile

99.8%

Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are
vulnerable to an unauthenticated remote code execution. An unauthenticated
remote code execution vulnerability allowed attackers to transfer a
serialized Java SignedObject object to the Jenkins CLI, that would be
deserialized using a new ObjectInputStream, bypassing the existing
blacklist-based protection mechanism. We’re fixing this issue by adding
SignedObject to the blacklist. We’re also backporting the new HTTP CLI
protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the
remoting-based (i.e. Java serialization) CLI protocol, disabling it by
default.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.971 High

EPSS

Percentile

99.8%