Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update advisory for Jenkins CVE-2016-1000027 #100

Merged
merged 1 commit into from
Jul 24, 2023

Conversation

priyawadhwa
Copy link
Contributor

I'm pretty sure this code path isn't in execution. This is an RCE vulnerability in the spring framework tooling related to Java deserialization. There's an extensive github issue which basically says that they have done everything they can do and the CVE is outdated.

I looked to see how Jenkins was using this library, and it looks like for their own vuln scanning support they also suppress this CVE, with a comment saying Data serialization is performed by the Jenkins framework, nothing specific to this application..

At that point I pretty much concluded Jenkins isn't running the vulnerable code in the spring tooling.

This is a Critical CVE though and also this is my first analysis, so if anyone disagrees please let me know 😄

closes #99

jenkins.advisories.yaml Outdated Show resolved Hide resolved
@kaniini kaniini enabled auto-merge July 24, 2023 16:29
@kaniini kaniini added this pull request to the merge queue Jul 24, 2023
Merged via the queue into wolfi-dev:main with commit 53e62ee Jul 24, 2023
2 checks passed
@priyawadhwa priyawadhwa deleted the jenkins branch July 24, 2023 16:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Jenkins CVE-2016-1000027
3 participants