HTTP: Jenkins Stapler Web Framework Code Execution

This signature detects attempts to exploit a known vulnerability against Stapler web framework used by Jenkins. A successful attack can lead to arbitrary code execution.

Extended Description

A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.

Affected Products

Jenkins jenkins

Short Name
HTTP:CTS:JENKINS-STAPLER-CE
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2018-1000861 Code Execution Framework Jenkins Stapler Web bid:106176
Release Date
12/10/2019
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3771
False Positive
Unknown
Vendors

Jenkins

Redhat

CVSS Score

10.0

Found a potential security threat?