Jenkins < 1.642.2 / 1.650 Java Object Deserialization RCE

Critical Nessus Plugin ID 89034

Synopsis

The remote web server is affected by a remote code execution vulnerability.

Description

The Jenkins web server running on the remote host is affected by a remote code execution vulnerability due to unsafe deserialize calls of unauthenticated Java objects to the Groovy library, specifically the runtime.MethodClosure class. An unauthenticated, remote attacker can exploit this, via a crafted XML file, to execute arbitrary code on the target host.

Note that the Jenkins web server may be affected by other vulnerabilities as well; however, Nessus has not tested for these.

Solution

Upgrade to Jenkins version 1.642.2 / 1.650 or later. Alternatively, disable the CLI port per the vendor advisory.

See Also

http://www.nessus.org/u?93a2c1f1

http://www.nessus.org/u?6e7fc0b6

http://www.nessus.org/u?e0204f30

Plugin Details

Severity: Critical

ID: 89034

File Name: jenkins_security247.nasl

Version: $Revision: 1.6 $

Type: remote

Family: General

Published: 2016/02/29

Modified: 2017/12/19

Dependencies: 65054

Risk Information

Risk Factor: Critical

CVSSv2

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:cloudbees:jenkins

Required KB Items: www/Jenkins

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/02/24

Vulnerability Publication Date: 2015/01/28

Exploitable With

Core Impact

Metasploit (Jenkins XStream Groovy classpath Deserialization Vulnerability)

Reference Information

CVE: CVE-2016-0792

BID: 83720

CERT: 576313