Skip to content

Aviksaikat/CVE-2016-0792

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Exploit for Jenkins serialization vulnerability - CVE-2016-0792


https://www.exploit-db.com/exploits/42394/

More information can be found here

  1. Contrast Security

  2. Pentester Lab

Requirements

  1. Python 3.6.x

  2. requests library is required for this exploit to work

    sudo pip install requests

Usage

python3 exp.py -u <url> -c <command>    
usage: exploit.py [-h] [-u U] [-c C]

CVE-2016-0792

optional arguments:
  -h, --help  show this help message and exit
  -u U        url to exploit
  -c C        command to execute

Disclaimer

Using this software to attack targets without permission is illegal. I am not responsible for any damage caused by using this software against the law.

About

Modified Verion of CVE-2016-0792

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages