From ad6637e1d7e0eedecaede0076f79e2ad4ecaa04c Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Thu, 12 May 2022 15:41:48 -0400 Subject: [PATCH] Enhancement: cves/2018/CVE-2018-1000861.yaml by mp --- cves/2018/CVE-2018-1000861.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-1000861.yaml b/cves/2018/CVE-2018-1000861.yaml index e416b05dd6..8194ae8495 100644 --- a/cves/2018/CVE-2018-1000861.yaml +++ b/cves/2018/CVE-2018-1000861.yaml @@ -1,7 +1,7 @@ id: CVE-2018-1000861 info: - name: Jenkins <=2.153 - Remote Command Injection + name: Jenkins - Remote Command Injection author: dhiyaneshDK,pikpikcu severity: critical description: Jenkins 2.153 and earlier and LTS 2.138.3 and earlier are susceptible to a remote command injection via stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.