First published: Thu Feb 25 2016(Updated: )
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.650 | 1.650 |
redhat/Jenkins | <1.642.2 | 1.642.2 |
Jenkins | <=1.649 | |
Red Hat OpenShift | =3.1 | |
Jenkins | <=1.642.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0792 has a high severity rating due to the potential for remote authenticated users to execute arbitrary code.
CVE-2016-0792 affects Jenkins versions before 1.650 and LTS versions before 1.642.2, allowing unauthorized code execution through serialized data.
To fix CVE-2016-0792, update Jenkins to version 1.650 or later, or LTS version 1.642.2 or later.
Exploitation of CVE-2016-0792 can lead to full control of the Jenkins server and potentially compromise sensitive data.
Users of Jenkins versions prior to 1.650 and LTS versions before 1.642.2 are affected by CVE-2016-0792.