漏洞描述 Jenkins存在未经身份验证的远程代码执行漏洞,经过序列化的Java SignedObject对象传输到基于远程处理的Jenkins CLI,在使用新的ObjectInputStream对象对其进行反序列化操作即可绕过现有的基于黑名单的保护机制。攻击者可利用漏洞在受影响的应用程序的上下文中执行任意代码,或造成程序拒绝服务。
相关漏洞推荐 (CVE-2025-59474)Jenkins侧边栏权限绕过漏洞 jenkins-unauthorized-rce: Jenkins unauthorized rce POC CVE-2017-1000353: Jenkins CLI - Java Deserialization POC CVE-2016-9299: Jenkins CLI - HTTP Java Deserialization POC CVE-2018-1000600: Jenkins GitHub Plugin <=1.29.1 - Server-Side Request Forgery POC CVE-2018-1000861: Jenkins - Remote Command Injection POC CVE-2019-1003000: Jenkins Script Security Plugin <=1.49 - Sandbox Bypass POC CVE-2019-10405: Jenkins <=2.196 - Cookie Exposure POC CVE-2019-10475: Jenkins build-metrics 1.3 - Cross-Site Scripting POC CVE-2020-2096: Jenkins Gitlab Hook <=1.4.2 - Cross-Site Scripting POC CVE-2020-2103: Jenkins <=2.218 - Information Disclosure POC CVE-2022-36883: Jenkins Git <=4.11.3 - Missing Authorization POC CVE-2024-23897: Jenkins < 2.441 - Arbitrary File Read