SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
Jenkins has a deserialization vulnerability in the "/cli" endpoint. Sending a maliciously crafted payload to the server can result in remote code execution.
A Java object deserialization vulnerability exists in the Jenkins CLI interface. This event is triggered when a serialized Java object is sent to the interface.
No public information
Known false positives, with the described conditions
Non-malicious serialized java objects
Cisco Talos Intelligence Group
MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application
MITRE::ATT&CK Framework::Enterprise::Privilege Escalation::Exploitation for Privilege Escalation
Insecure Deserialization
Insecure Deserialization relates to web application security. Applications turn an object into data through serialization; the reverse of that process, deserialization, can be vulnerable to attacks when the application trusts the data that is being deserialized. Serialized data is machine readable and not encrypted; serialized user-supplied data should not be trusted. Deserialization attacks can lead to remote code execution.
CVE-2016-9299 |
Loading description
|
CVE-2017-1000353 |
Loading description
|