Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1395172 - (CVE-2016-9299) CVE-2016-9299 jenkins: Java deserialization flaw leads to RCE
CVE-2016-9299 jenkins: Java deserialization flaw leads to RCE
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20161111,repo...
: Security
Depends On: 1395173 1395174
Blocks: 1395176
  Show dependency treegraph
 
Reported: 2016-11-15 05:41 EST by Adam Mariš
Modified: 2018-06-29 18:15 EDT (History)
18 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-11-15 05:41:46 EST
An unauthenticated remote code execution vulnerability was discovered in the Jenkins continuous integration and continuous delivery automation server. A serialized Java object transferred to the Jenkins CLI can make Jenkins connect to an attacker-controlled LDAP server, which in turn can send a serialized payload leading to code execution, bypassing existing protection mechanisms.

Upstream advisory:

https://groups.google.com/forum/#!msg/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJ

CVE assignment:

http://seclists.org/oss-sec/2016/q4/423


Mitigation:

https://github.com/jenkinsci-cert/SECURITY-218
Comment 2 Adam Mariš 2016-11-15 05:42:38 EST
Created jenkins tracking bugs for this issue:

Affects: fedora-all [bug 1395174]
Comment 3 Andrej Nemec 2016-11-18 05:15:15 EST
External References:

https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-11-16
Comment 4 Trevor Jay 2016-11-20 23:30:47 EST
I've looked at our Jenkins container images (from/for OpenShift) and I am *not* recommending respins of those images.

While mentioned in the `EXPOSE` list, port 50000 (the CLI port) is only available to the outside world if the user either explicitly maps it (`-p 50000:X`) or uses the always-a-bad-idea `-P`. In OpenShift, port 50000 is not automatically exposed via `oc expose svc/jenkins-X-rhel7` as only the web interface (8080) is listed in the `openshift.io.expose-services` label and routed to.

In other words: the CLI is by default only exposed within the private network on vanilla Docker and only within the cluster by default on vanilla OpenShift. This lowers the risk to moderate within these context and---in my judgement---below the threshold needed to require respins.

_Trevor

Note You need to log in before you can comment on or make changes to this bug.