Remote Code Execution Vulnerability in Jenkins Code Coverage API Plugin by Jenkins
CVE-2021-21677
8.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 31 August 2021
Summary
The Jenkins Code Coverage API Plugin versions 1.4.0 and prior are vulnerable due to a failure to maintain appropriate deserialization protections as specified by Jenkins Enhancement Proposal (JEP) 200. This oversight allows an attacker to exploit the deserialization of Java objects from disk, leading to potential remote code execution. It is crucial for users to update to the latest version to mitigate the risks associated with this vulnerability.
Affected Version(s)
Jenkins Code Coverage API Plugin <= 1.4.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved