CVE-2018-1000861

Scores

EPSS

0.945High94.5%
0%20%40%60%80%100%

Percentile: 94.5%

CVSS

8.8High3.x
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 3.x
8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhat

CWEs

CWE-470CWE-502

Related Vulnerabilities

Exploits

Exploit ID: CVE-2018-1000861

Source: github-poc

URL: https://github.com/smokeintheshell/CVE-2018-1000861

Recommendations

Source: nvd

Before applying this update, ensure all previously released erratarelevant to your system have been applied.
See the following documentation, which will be updated shortly for release 3.11.59, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html
This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available at https://access.redhat.com/articles/11258.

URL: https://access.redhat.com/errata/RHBA-2019:0024

Vulnerable Software (4)

Type: Configuration

Product: jenkins

Operating System: rhel

Trait:
{
  "fixed": "2.138.4.1544416383-1.el7"
}

Source: redhat

Type: Configuration

Product: jenkins

Operating System: debian

Trait:
{
  "unfixed": true
}

Source: debian

Type: Configuration

Vendor: jenkins

Product: jenkins

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
      "versionEndIncluding": "2.138.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:jen...

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_container_platform

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd