Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-0792

EPSS 90.85% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2016-0792

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
CloudBees Jenkins CI和LTS 任意代码执行漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
CloudBees Jenkins是美国CloudBees公司的一款基于Java开发的开源的、可持续集成的自动化服务器,它主要用于监控持续的软件版本发布/测试项目和一些定时执行的任务。LTS(Long-Term Support)是CloudBees Jenkins的一个长期支持版本。 CloudBees Jenkins CI 1.650之前版本和LTS 1.642.2之前版本的API端点存在安全。远程攻击者可借助XML文件中的序列化数据利用该漏洞执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2016-0792

#POC DescriptionSource LinkShenlong Link
1Exploit for Jenkins serialization vulnerability - CVE-2016-0792https://github.com/jpiechowka/jenkins-cve-2016-0792POC Details
2Exploit for Jenkins serialization vulnerability - CVE-2016-0792https://github.com/R0B1NL1N/java-deserialization-exploitsPOC Details
3Modified Verion of CVE-2016-0792https://github.com/Aviksaikat/CVE-2016-0792POC Details
4Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Jenkins%20XStream%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%20CVE-2016-0792.mdPOC Details
5CVE-2016-0792 Exploit By XBOW AIhttps://github.com/gonn4cry/CVE-2016-0792POC Details
6CVE-2016-0792 Exploit By XBOW AIhttps://github.com/bugdotexe/CVE-2016-0792POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2016-0792

Please Login to view more intelligence information

Same Patch Batch · n/a · 2016-04-07 · 36 CVEs total

CVE-2016-0790CloudBees Jenkins CI和LTS 安全漏洞
CVE-2016-2510BeanShell 任意命令执行漏洞
CVE-2015-2774Erlang OTP 信息泄露漏洞
CVE-2016-0729Apache Xerces XML Parser库缓冲区错误漏洞
CVE-2016-2086Joyent Node.js 安全漏洞
CVE-2016-2216Joyent Node.js HTTP响应拆分攻击
CVE-2016-2511websvn 跨站脚本漏洞
CVE-2016-0788CloudBees Jenkins CI和LTS 远程代码执行漏洞
CVE-2016-0789CloudBees Jenkins CI和LTS CLI CRLF注入漏洞
CVE-2015-8681Huawei P8和Mate S ovisp驱动程序安全漏洞
CVE-2016-0791CloudBees Jenkins CI和LTS 安全漏洞
CVE-2016-1531Exim Configuration File Path 安全漏洞
CVE-2016-2097Ruby on Rails Action View组件目录遍历漏洞
CVE-2016-2098Ruby on Rails Action Pack 安全漏洞
CVE-2016-2563PuTTY和KiTTY 基于栈的缓冲区溢出漏洞
CVE-2016-2789Citrix Systems XenMobile Server 跨站脚本漏洞
CVE-2016-2851libotr 整数溢出漏洞
CVE-2016-3976SAP NetWeaver AS Java 目录遍历漏洞
CVE-2016-3973SAP NetWeaver AS Java Real-Time Collaboration服务安全漏洞
CVE-2016-1019Adobe Flash Player 安全漏洞

Showing top 20 of 36 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2016-0792

No comments yet


Leave a comment