vendor:
Jenkins
by:
Arshan Dabirsiaghi, Matt Byrne
8,8
CVSS
HIGH
Remote Code Execution
95
CWE
Product Name: Jenkins
Affected Version From: 1.650
Affected Version To: 1.642.2
Patch Exists: YES
Related CWE: CVE-2016-0792
CPE: a:jenkins:jenkins
Metasploit:
https://www.rapid7.com/db/vulnerabilities/jenkins-2016-02-24_cve-2016-0792/, https://www.rapid7.com/db/vulnerabilities/redhat-openshift-cve-2016-0792/, https://www.rapid7.com/db/modules/exploit/multi/http/jenkins_xstream_deserialize/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-7e01df39-db7e-11e5-b937-00e0814cab4e/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2016
Jenkins XStream Groovy classpath Deserialization Vulnerability
This module exploits CVE-2016-0792 a vulnerability in Jenkins versions older than 1.650 and Jenkins LTS versions older than 1.642.2 which is caused by unsafe deserialization in XStream with Groovy in the classpath, which allows remote arbitrary code execution. The issue affects default installations. Authentication is not required to exploit the vulnerability.
Mitigation:
Upgrade Jenkins to version 1.650 or Jenkins LTS to version 1.642.2 or later.