漏洞描述 Jenkins的反序列化漏洞,攻击者使用该漏洞可以在被攻击服务器执行任意代码,漏洞利用不需要任何的权限 漏洞影响范围:所有Jenkins主版本均受到影响(包括<=2.56版本) 所有Jenkins LTS 均受到影响( 包括<=2.46.1版本)
相关漏洞推荐 CVE-2018-1000861: Jenkins 2.138 Remote Command Execution POC 2025-09-01 | Jenkins A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier... jenkins-default-pwd: Jenkins Default Password POC 2025-09-01 | Jenkins app="Jenkins" jenkins-api-panel: Jenkins API Instance Detection Template POC 2025-09-01 | jenkins-api-panel Try to detect the presence of a Jenkins API instance via the API default XML endpoint CVE-2017-1000028: GlassFish LFI POC 2025-09-01 | GlassFish GlassFish是一款强健的商业兼容应用服务器,达到产品级质量,可免费用于开发、部署和重新分发。开发者可以免费获得源代码,还可以对代码进行更改。GlassFish漏洞成因:java语义中会把&quo... CVE-2017-1000486: Primetek Primefaces 5.x - Remote Code Execution POC 2025-09-01 | Primetek Primefaces Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution.