CVE-2016-0792
Jenkins < 1.650 - Java Deserialization
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
7Exploited in Wild
-Decision
Descriptions
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
Múltiples terminales API no especificadas en Jenkins en versiones anteriores a 1.650 y LTS en versiones anteriores a 1.642.2 permiten a usuarios remotos autenticados ejecutar código arbitrario a través de datos serializados en un archivo XML, relacionado con XStream y groovy.util.Expando.
OpenShift Enterprise by Red Hat is the company's cloud computing Platform- as-a-Service solution designed for on-premise or private cloud deployments. Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Security Fix: The Jenkins continuous integration server has been updated to upstream version 1.642.2 LTS that addresses a large number of security issues, including XSS, CSRF, information disclosure, and code execution.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-12-16 CVE Reserved
- 2016-04-07 CVE Published
- 2017-07-30 First Exploit
- 2024-08-05 CVE Updated
- 2025-03-28 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (13)
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/143523 | 2017-07-30 | |
https://packetstorm.news/files/id/145477 | 2017-12-19 | |
https://www.exploit-db.com/exploits/42394 | 2024-08-05 | |
https://www.exploit-db.com/exploits/43375 | 2024-08-05 | |
https://github.com/Aviksaikat/CVE-2016-0792 | 2023-10-17 | |
https://github.com/jpiechowka/jenkins-cve-2016-0792 | 2024-08-12 | |
https://www.contrastsecurity.com/security-influencers/serialization-must-die-act-2-xstream | 2024-08-05 |
URL | Date | SRC |
---|---|---|
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24 | 2018-01-05 |
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2016-1773.html | 2018-01-05 | |
https://access.redhat.com/errata/RHSA-2016:0711 | 2018-01-05 | |
https://access.redhat.com/security/cve/CVE-2016-0792 | 2016-08-24 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1311950 | 2016-08-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Jenkins Search vendor "Jenkins" | Jenkins Search vendor "Jenkins" for product "Jenkins" | <= 1.649 Search vendor "Jenkins" for product "Jenkins" and version " <= 1.649" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openshift Search vendor "Redhat" for product "Openshift" | 3.1 Search vendor "Redhat" for product "Openshift" and version "3.1" | enterprise |
Affected
| ||||||
Jenkins Search vendor "Jenkins" | Jenkins Search vendor "Jenkins" for product "Jenkins" | <= 1.642.1 Search vendor "Jenkins" for product "Jenkins" and version " <= 1.642.1" | lts |
Affected
|