First published: Thu Jan 12 2017(Updated: )
The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | <=2.19.2 | 2.19.3 |
maven/org.jenkins-ci.main:jenkins-core | >=2.20<=2.31 | 2.32 |
Jenkins LTS | <=2.19.2 | |
Jenkins LTS | <=2.31 | |
Fedora | =25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9299 is considered a critical vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2016-9299, upgrade Jenkins to version 2.32 or later, or to LTS version 2.19.3 or later.
CVE-2016-9299 affects Jenkins versions prior to 2.32 and LTS versions prior to 2.19.3.
Yes, CVE-2016-9299 can be exploited remotely by attackers using crafted serialized Java objects.
Exploitation of CVE-2016-9299 can lead to arbitrary code execution on the server where Jenkins is running.