Description
The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.
Remediation
References
https://www.cloudbees.com/jenkins-security-advisory-2016-11-16
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-11-16
http://www.slideshare.net/codewhitesec/java-deserialization-vulnerabilities-the-forgotten-bug-class-deepsec-edition
http://www.securityfocus.com/bid/94281
http://www.openwall.com/lists/oss-security/2016/11/14/9
http://www.openwall.com/lists/oss-security/2016/11/12/4
https://www.exploit-db.com/exploits/44642/
https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/LZ7EOS0fBgAJ
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW2KUKYLNLVDB7STLHLYALCUFLEGCRM6/
https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ
Related Vulnerabilities
CVE-2014-2858 Vulnerability in maven package org.grails:grails-core
CVE-2022-41854 Vulnerability in maven package org.yaml:snakeyaml
CVE-2009-0781 Vulnerability in maven package org.apache.tomcat:catalina
CVE-2022-25854 Vulnerability in npm package @yaireo/tagify
CVE-2023-30541 Vulnerability in npm package @openzeppelin/contracts