Zero-day Vulnerability Database
Zero-day vulnerabilities discovered: 1
LDAP injection
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to the flaw in the remoting module when handling malicious objects. A remote attacker can transfer a specially crafted serialized Java object to the Jenkins CLI, make Jenkins connect to an attacker-controlled LDAP server, bypass existing protection mechanisms and execute arbitrary code on vulnerable system.
Successful exploitation of the vulnerability results in arbitrary code excution on the vulnerable system.
Note: the vulnerability was being actively exploited.
LDAP injection
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to the flaw in the remoting module when handling malicious objects. A remote attacker can transfer a specially crafted serialized Java object to the Jenkins CLI, make Jenkins connect to an attacker-controlled LDAP server, bypass existing protection mechanisms and execute arbitrary code on vulnerable system.
Successful exploitation of the vulnerability results in arbitrary code excution on the vulnerable system.
Note: the vulnerability was being actively exploited.