vendor:
Jenkins
by:
7.5
CVSS
HIGH
Arbitrary Code Execution
CWE
Product Name: Jenkins
Affected Version From:
Affected Version To:
Patch Exists: YES
Related CWE:
CPE:
Platforms Tested:
Arbitrary Code Execution via Grape in Jenkins
The vulnerability allows an attacker to execute arbitrary code by leveraging the processOtherServices and processRunners methods in the GrapeIvy class of the Groovy library used by Jenkins. By creating a malicious JAR file and placing the class name in the META-INF/services/org.codehaus.groovy.plugins.Runners file, an attacker can invoke the Constructor and execute arbitrary code.
Mitigation:
To mitigate this vulnerability, it is recommended to update to the latest version of Jenkins and Groovy library. Additionally, it is advised to only use trusted JAR files and ensure that they do not contain any malicious code.