RULE(RULE ID:322703)

Rule General Information
Release Date: 2019-07-10
Rule Name: CloudBees Jenkins Unauthenticated Code Execution Vulnerability (CVE-2017-1000353)
Severity:
CVE ID:
Rule Protection Details
Description: Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blocklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blocklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: SecurityFocusBID:98056
ExploitDB:41965
https://jenkins.io/security/advisory/2017-04-26/
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://jenkins.io/security/advisory/2017-04-26/