CVE-2016-0792: Jenkins allows Deserialization of Untrusted Data via an XML File
(updated )
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
References
- access.redhat.com/errata/RHSA-2016:0711
- github.com/advisories/GHSA-45rg-g72w-r393
- github.com/jenkinsci/jenkins
- github.com/jenkinsci/jenkins/commit/7f202f0317e60cd3160f61467b8558f864f83f41
- nvd.nist.gov/vuln/detail/CVE-2016-0792
- wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24
- www.contrastsecurity.com/security-influencers/serialization-must-die-act-2-xstream
- www.exploit-db.com/exploits/42394
- www.exploit-db.com/exploits/43375
Detect and mitigate CVE-2016-0792 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →