Remote Code Execution Vulnerability in Jenkins Code Coverage API Plugin by Jenkins
CVE-2021-21677

8.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
31 August 2021

Summary

The Jenkins Code Coverage API Plugin versions 1.4.0 and prior are vulnerable due to a failure to maintain appropriate deserialization protections as specified by Jenkins Enhancement Proposal (JEP) 200. This oversight allows an attacker to exploit the deserialization of Java objects from disk, leading to potential remote code execution. It is crucial for users to update to the latest version to mitigate the risks associated with this vulnerability.

Affected Version(s)

Jenkins Code Coverage API Plugin <= 1.4.0

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.