'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2026-03-04 | |
| Rule Name: | Jenkins Git-Parameter Plugin Remote Command Execution Vulnerability (CVE-2025-53652) | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | Jenkins is an open-source automated server, which is widely used to automate various tasks, including building, testing and deploying software. Git Parameter Plugin is a plug-in of Jenkins, which is used to process Git parameters during the construction process. Jenkins' Git-Parameter has a remote command execution vulnerability. Attackers can execute arbitrary commands through the vulnerability to obtain server permissions, which may lead to further attacks on the intranet. | |
| Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | ||
| Solutions |
|---|
| Please contact the software vendor to update the software patch. |