Jenkins allows Deserialization of Untrusted Data via an XML File
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Mar 13, 2025
Package
Affected versions
>= 1.643, < 1.650
< 1.642
Patched versions
1.650
1.642.2
Description
Published by the National Vulnerability Database
Apr 7, 2016
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Mar 13, 2025
Last updated
Mar 13, 2025
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
References