Jenkins < 1.642.2 / 1.650 Java Object Deserialization RCE

High Nessus Plugin ID 89034


The remote web server is affected by a remote code execution vulnerability.


The Jenkins web server running on the remote host is affected by a remote code execution vulnerability due to unsafe deserialize calls of unauthenticated Java objects to the Groovy library, specifically the runtime.MethodClosure class. An unauthenticated, remote attacker can exploit this, via a crafted XML file, to execute arbitrary code on the target host.

Note that the Jenkins web server may be affected by other vulnerabilities as well; however, Nessus has not tested for these.


Upgrade to Jenkins version 1.642.2 / 1.650 or later. Alternatively, disable the CLI port per the vendor advisory.

See Also

Plugin Details

Severity: High

ID: 89034

File Name: jenkins_security247.nasl

Version: 1.10

Type: remote

Family: General

Published: 2016/02/29

Updated: 2019/11/20

Dependencies: 65054

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2016-0792

CVSS v2.0

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cloudbees:jenkins

Required KB Items: www/Jenkins

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/02/24

Vulnerability Publication Date: 2015/01/28

Exploitable With

Core Impact

Metasploit (Jenkins XStream Groovy classpath Deserialization Vulnerability)

Reference Information

CVE: CVE-2016-0792

BID: 83720

CERT: 576313