Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-0792 PoC — CloudBees Jenkins CI和LTS 任意代码执行漏洞

Source
Associated Vulnerability
Title:CloudBees Jenkins CI和LTS 任意代码执行漏洞 (CVE-2016-0792)
Description:CloudBees Jenkins是美国CloudBees公司的一款基于Java开发的开源的、可持续集成的自动化服务器,它主要用于监控持续的软件版本发布/测试项目和一些定时执行的任务。LTS(Long-Term Support)是CloudBees Jenkins的一个长期支持版本。 CloudBees Jenkins CI 1.650之前版本和LTS 1.642.2之前版本的API端点存在安全。远程攻击者可借助XML文件中的序列化数据利用该漏洞执行任意代码。
Description
Modified Verion of CVE-2016-0792
Readme
# Exploit for Jenkins serialization vulnerability - CVE-2016-0792

---
[https://www.exploit-db.com/exploits/42394/](https://www.exploit-db.com/exploits/42394/)

#### More information can be found here

1. [Contrast Security](https://www.contrastsecurity.com/security-influencers/serialization-must-die-act-2-xstream)

2. [Pentester Lab](https://www.pentesterlab.com/exercises/cve-2016-0792/)

#### Requirements

1. Python 3.6.x

2. [requests](http://docs.python-requests.org/en/master/) library is required for this exploit to work

      `sudo pip install requests`

#### Usage
- [Old way](https://github.com/jpiechowka/jenkins-cve-2016-0792)
- New Way
```bash
python3 exp.py -u <url> -c <command>    
```
```bash
usage: exploit.py [-h] [-u U] [-c C]

CVE-2016-0792

optional arguments:
  -h, --help  show this help message and exit
  -u U        url to exploit
  -c C        command to execute
```
![](images/1.png)

  


#### Disclaimer
Using this software to attack targets without permission is illegal. I am not responsible for any damage caused by using
 this software against the law.
File Snapshot

[4.0K] /data/pocs/1cb6306a23864b2effe6ac1beb148eaea6b55fba ├── [5.2K] exploit.py ├── [4.0K] images │   └── [ 81K] 1.png ├── [1.0K] LICENSE └── [1.1K] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.