Vulnerability Details : CVE-2015-8103
Public exploit exists!
The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".
Vulnerability category: Execute code
Products affected by CVE-2015-8103
- cpe:2.3:a:redhat:openshift_container_platform:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
- cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
Threat overview for CVE-2015-8103
Top countries where our scanners detected CVE-2015-8103
Top open port discovered on systems with this issue
8088
IPs affected by CVE-2015-8103 2,022
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2015-8103!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2015-8103
83.93%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2015-8103
-
Jenkins-CI Unauthenticated Script-Console Scanner
First seen: 2020-04-26auxiliary/scanner/http/jenkins_commandThis module scans for unauthenticated Jenkins-CI script consoles and executes the specified command. Authors: - altonjx - Jeffrey Cap -
Jenkins CLI RMI Java Deserialization Vulnerability
Disclosure Date: 2015-11-18First seen: 2020-04-26exploit/linux/misc/jenkins_java_deserializeThis module exploits a vulnerability in Jenkins. An unsafe deserialization bug exists on the Jenkins master, which allows remote arbitrary code execution. Authentication is not required to exploit this vulnerability. Authors: - Christopher Frohoff - Steve Breen -
OpenNMS Java Object Unserialization Remote Code Execution
Disclosure Date: 2015-11-06First seen: 2020-04-26exploit/linux/misc/opennms_java_serializeThis module exploits a vulnerability in the OpenNMS Java object which allows an unauthenticated attacker to run arbitrary code against the system. Authors: - Ben Turner <benpturner@yahoo.com>
CVSS scores for CVE-2015-8103
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-01-09 |
CWE ids for CVE-2015-8103
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
-
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8103
-
https://jenkins-ci.org/content/mitigating-unauthenticated-remote-code-execution-0-day-jenkins-cli
Mitigating unauthenticated remote code execution 0-day in Jenkins CLIExploit
-
http://www.openwall.com/lists/oss-security/2015/11/18/2
oss-security - Re: CVE request: Jenkins remote code execution vulnerability due to unsafe deserializationMailing List
-
http://www.openwall.com/lists/oss-security/2015/11/18/13
oss-security - Re: CVE request: Jenkins remote code execution vulnerability due to unsafe deserializationMailing List
-
https://access.redhat.com/errata/RHSA-2016:0070
RHSA-2016:0070 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/#jenkins
What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common? This Vulnerability.Exploit
-
https://www.exploit-db.com/exploits/38983/
Jenkins CLI - RMI Java Deserialization (Metasploit)Exploit;Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/77636
Jenkins CVE-2015-8103 Remote Code Execution VulnerabilityBroken Link
-
http://rhn.redhat.com/errata/RHSA-2016-0489.html
RHSA-2016:0489 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2015/11/09/5
oss-security - CVE request: Jenkins remote code execution vulnerability due to unsafe deserializationMailing List
-
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11
Jenkins Security Advisory 2015-11-11 - Security Advisories - Jenkins WikiVendor Advisory
-
http://www.openwall.com/lists/oss-security/2015/11/18/11
oss-security - Re: Re: CVE request: Jenkins remote code execution vulnerability due to unsafe deserializationMailing List
-
http://packetstormsecurity.com/files/134805/Jenkins-CLI-RMI-Java-Deserialization.html
Jenkins CLI RMI Java Deserialization ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to