CVE-2016-9299

The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.
References
Link Resource
http://www.openwall.com/lists/oss-security/2016/11/12/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/11/14/9 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/94281 Third Party Advisory VDB Entry
http://www.slideshare.net/codewhitesec/java-deserialization-vulnerabilities-the-forgotten-bug-class-deepsec-edition Third Party Advisory
https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ
https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/LZ7EOS0fBgAJ
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW2KUKYLNLVDB7STLHLYALCUFLEGCRM6/
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-11-16 Vendor Advisory
https://www.cloudbees.com/jenkins-security-advisory-2016-11-16 Vendor Advisory
https://www.exploit-db.com/exploits/44642/ Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2016/11/12/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/11/14/9 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/94281 Third Party Advisory VDB Entry
http://www.slideshare.net/codewhitesec/java-deserialization-vulnerabilities-the-forgotten-bug-class-deepsec-edition Third Party Advisory
https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ
https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/LZ7EOS0fBgAJ
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW2KUKYLNLVDB7STLHLYALCUFLEGCRM6/
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-11-16 Vendor Advisory
https://www.cloudbees.com/jenkins-security-advisory-2016-11-16 Vendor Advisory
https://www.exploit-db.com/exploits/44642/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*

History

21 Nov 2024, 03:00

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2016/11/12/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/11/12/4 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/11/14/9 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/11/14/9 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/94281 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94281 - Third Party Advisory, VDB Entry
References () http://www.slideshare.net/codewhitesec/java-deserialization-vulnerabilities-the-forgotten-bug-class-deepsec-edition - Third Party Advisory () http://www.slideshare.net/codewhitesec/java-deserialization-vulnerabilities-the-forgotten-bug-class-deepsec-edition - Third Party Advisory
References () https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ - () https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ -
References () https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/LZ7EOS0fBgAJ - () https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/LZ7EOS0fBgAJ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW2KUKYLNLVDB7STLHLYALCUFLEGCRM6/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW2KUKYLNLVDB7STLHLYALCUFLEGCRM6/ -
References () https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-11-16 - Vendor Advisory () https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-11-16 - Vendor Advisory
References () https://www.cloudbees.com/jenkins-security-advisory-2016-11-16 - Vendor Advisory () https://www.cloudbees.com/jenkins-security-advisory-2016-11-16 - Vendor Advisory
References () https://www.exploit-db.com/exploits/44642/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/44642/ - Third Party Advisory, VDB Entry

07 Nov 2023, 02:36

Type Values Removed Values Added
References
  • {'url': 'https://groups.google.com/forum/#!original/jenkinsci-advisories/-fc-w9tNEJE/LZ7EOS0fBgAJ', 'name': '[jenkinsci-advisories] 20161111 Re: Unauthenticated remote code execution vulnerability in Jenkins', 'tags': ['Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://groups.google.com/forum/#!original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ', 'name': '[jenkinsci-advisories] 20161111 Unauthenticated remote code execution vulnerability in Jenkins', 'tags': ['Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW2KUKYLNLVDB7STLHLYALCUFLEGCRM6/', 'name': 'FEDORA-2016-368780879d', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW2KUKYLNLVDB7STLHLYALCUFLEGCRM6/ -
  • () https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ -
  • () https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/LZ7EOS0fBgAJ -

Information

Published : 2017-01-12 23:59

Updated : 2024-11-21 03:00


NVD link : CVE-2016-9299

Mitre link : CVE-2016-9299

CVE.ORG link : CVE-2016-9299


JSON object : View

Products Affected

jenkins

  • jenkins

fedoraproject

  • fedora
CWE
CWE-90

Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')