The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.Referenceshttps://www.exploit-db.com/exploits/44642/http://www.openwall.com/lists/oss-security/2016/11/12/4http://www.securityfocus.com/bid/94281https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/LZ7EOS0fBgAJhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW2KUKYLNLVDB7STLHLYALCUFLEGCRM6/https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-11-16https://groups.google.com/forum/#%21original/jenkinsci-advisories/-fc-w9tNEJE/GRvEzWoJBgAJhttp://www.slideshare.net/codewhitesec/java-deserialization-vulnerabilities-the-forgotten-bug-class-deepsec-editionhttps://www.cloudbees.com/jenkins-security-advisory-2016-11-16http://www.openwall.com/lists/oss-security/2016/11/14/9