#VU10657 Command injection in Jenkins - CVE-2017-1000353
Published: February 15, 2018 / Updated: October 2, 2025
Vulnerability identifier: #VU10657
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2017-1000353
CWE-ID: CWE-77
Exploitation vector: Remote access
Exploit availability:
The vulnerability is being exploited in the wild
Vulnerable software:
Jenkins
Jenkins
Software vendor:
Jenkins
Jenkins
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to lack of serialized object validation. A remote attacker can transfer a serialized Java SignedObject object to the remoting-based Jenkins CLI, deserialize it using a new ObjectInputStream, bypass the existing blacklist-based protection mechanism, inject arbitrary commands and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists due to lack of serialized object validation. A remote attacker can transfer a serialized Java SignedObject object to the remoting-based Jenkins CLI, deserialize it using a new ObjectInputStream, bypass the existing blacklist-based protection mechanism, inject arbitrary commands and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Update to version 2.57.