Vulnerability in Jenkins Core
This affects all versions of Jenkins prior to 1.438 and 1.409.3, but only if you are running it on its stand-alone container. This "stand-alone container" setup includes those who have installed Jenkins via native packages, including Windows, Mac OS X, Debian, Redhat, and OpenSUSE.
CloudBees rate this vulnerability as high, as the attack is passive, even though it allows an attacker to impersonate the administrator.
This issue has been fixed in Jenkins 1.438. We recommend you update your Jenkins to this version or later. If you don't see the update in your update center, you can download it manually and replace your
jenkins.war . LTS users should update to Jenkins 1.409.3, which fixes this problem.
Running Jenkins on other servlet containers is another possible fix to the problem, such as jetty runner , which allows similar command-line execution.