Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
References
Configurations
History
21 Nov 2024, 02:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-1773.html - | |
References | () https://access.redhat.com/errata/RHSA-2016:0711 - | |
References | () https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24 - Patch, Vendor Advisory | |
References | () https://www.contrastsecurity.com/security-influencers/serialization-must-die-act-2-xstream - Exploit | |
References | () https://www.exploit-db.com/exploits/42394/ - | |
References | () https://www.exploit-db.com/exploits/43375/ - |
Information
Published : 2016-04-07 23:59
Updated : 2024-11-21 02:42
NVD link : CVE-2016-0792
Mitre link : CVE-2016-0792
CVE.ORG link : CVE-2016-0792
JSON object : View
Products Affected
jenkins
- jenkins
redhat
- openshift
CWE
CWE-20
Improper Input Validation