RCE vulnerability in Jenkins Code Coverage API Plugin
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 15, 2023
Package
Affected versions
<= 1.4.0
Patched versions
1.4.1
Description
Published by the National Vulnerability Database
Aug 31, 2021
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 15, 2022
Last updated
Dec 15, 2023
Jenkins Code Coverage API Plugin 1.4.0 and earlier does not apply JEP-200 deserialization protection to Java objects it deserializes from disk.
This results in a remote code execution (RCE) vulnerability exploitable by attackers able to control agent processes.
Jenkins Code Coverage API Plugin 1.4.1 configures its Java object deserialization to only deserialize safe types.
References