HTTP: Jenkins CI Server Groovy Pipeline Remote Code Execution

This signature detects attempts to exploit a known vulnerability against Groovy Pipeline plugin component of Jenkins CI. A successful attack can lead to arbitrary code execution.

Extended Description

A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.

Affected Products

Jenkins jenkins

Short Name
HTTP:CTS:JENKINS-GROOVY-RCE
Severity
Minor
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CI CVE-2019-1003001 Code Execution Groovy Jenkins Pipeline Remote Server
Release Date
10/03/2019
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3771
False Positive
Unknown
Vendors

Jenkins

Redhat

CVSS Score

6.5

Found a potential security threat?