CVE-2020-2189

HIGH

Jenkins Source Code Management Filter... - Insecure Deserialization

Title source: rule

Description

Jenkins SCM Filter Jervis Plugin 0.2.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

Scores

CVSS v3 8.8
EPSS 0.0081
EPSS Percentile 73.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-502
Status published

Affected Products (2)

jenkins/source_code_management_filter_jervis < 0.2.1
io.jenkins.plugins/scm-filter-jervis < 0.3Maven

Timeline

Published May 06, 2020
Tracked Since Feb 18, 2026