A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hhpm-5cp2-hg4x Deserialization of Untrusted Data in Jenkins
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 07 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-02-10'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Aug 2024 00:15:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-07-30T01:46:11.109Z

Reserved: 2018-12-10T00:00:00.000Z

Link: CVE-2018-1000861

cve-icon Vulnrichment

Updated: 2024-08-05T12:47:57.431Z

cve-icon NVD

Status : Analyzed

Published: 2018-12-10T14:29:01.417

Modified: 2025-03-14T18:22:36.750

Link: CVE-2018-1000861

cve-icon Redhat

Severity : Important

Publid Date: 2018-12-05T00:00:00Z

Links: CVE-2018-1000861 - Bugzilla

cve-icon OpenCVE Enrichment

No data.