This Metasploit module exploits CVE-2016-0792 a vulnerability in Jenkins versions older than 1.650 and Jenkins LTS versions older than 1.642.2 which is caused by unsafe deserialization in XStream with Groovy in the classpath, which allows remote arbitrary code execution. The issue affects default installations. Authentication is not required to exploit the vulnerability.
52a40982d2eed44b68632a3f6deca119172cfb8a682bb8fd52169cc4b2182bba
Jenkins versions prior to 1.650 suffer from a java deserialization vulnerability.
f932931a24baa84b8aaf780ee1292f4ad857cbdaed0ab3be3e22d84b53765295
Red Hat Security Advisory 2016-1773-01 - OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. The Jenkins continuous integration server has been updated to upstream version 1.651.2 LTS that addresses a large number of security issues, including open redirects, a potential denial of service, unsafe handling of user provided environment variables and several instances of sensitive information disclosure.
d21a44fcf349a12558e1bf494277c24c60b24dd0894fb71b09edaef3e3d7f9e4
Red Hat Security Advisory 2016-0711-01 - OpenShift Enterprise by Red Hat is the company's cloud computing Platform- as-a-Service solution designed for on-premise or private cloud deployments. Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Security Fix: The Jenkins continuous integration server has been updated to upstream version 1.642.2 LTS that addresses a large number of security issues, including XSS, CSRF, information disclosure, and code execution.
8cb241f7f26e24db895bca20b367c5d2ec75547e9aa7d1d03f82eab44c897d01