Jenkins commons-collections Java Library Deserialization Vulnerability Remote Code Execution Exploit Update

Jenkins is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary Java objects leading to remote code execution. This update adds proper CVE number, support for Jenkins with HTTPS enabled, and DNS channel support. It also extends on the supported platforms, improves IPv6 functionality and removes redundant code.
Exploit type: 
Platform: 
Vulnerabilty ID: 
CVE-2015-8103
Product Version: 
2015_R1
Released Date: 
Tuesday, January 19, 2016 - 00:00