logo

CVE-2016-0792 org.jenkins-ci.main:jenkins-core

Package

Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=1.643 <1.650 || >=0 <1.642.2

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.89805 pctl0.99545

Details

Jenkins allows Deserialization of Untrusted Data via an XML File Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.

Metadata

Created: 2022-05-14T03:58:15Z
Modified: 2025-03-13T18:02:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-45rg-g72w-r393/GHSA-45rg-g72w-r393.json
CWE IDs: ["CWE-20", "CWE-502"]
Alternative ID: GHSA-45rg-g72w-r393
Finding: F096
Auto approve: 1