The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.
References
Configurations
History
21 Nov 2024, 03:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2016/11/12/4 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/11/14/9 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/94281 - Third Party Advisory, VDB Entry | |
References | () http://www.slideshare.net/codewhitesec/java-deserialization-vulnerabilities-the-forgotten-bug-class-deepsec-edition - Third Party Advisory | |
References | () https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ - | |
References | () https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/LZ7EOS0fBgAJ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW2KUKYLNLVDB7STLHLYALCUFLEGCRM6/ - | |
References | () https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-11-16 - Vendor Advisory | |
References | () https://www.cloudbees.com/jenkins-security-advisory-2016-11-16 - Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/44642/ - Third Party Advisory, VDB Entry |
07 Nov 2023, 02:36
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-01-12 23:59
Updated : 2024-11-21 03:00
NVD link : CVE-2016-9299
Mitre link : CVE-2016-9299
CVE.ORG link : CVE-2016-9299
JSON object : View
Products Affected
jenkins
- jenkins
fedoraproject
- fedora
CWE
CWE-90
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')