module
Jenkins XStream Groovy classpath Deserialization Vulnerability
Disclosed | Created |
---|---|
2016-02-24 | 2018-06-14 |
Disclosed
2016-02-24
Created
2018-06-14
Description
This module exploits CVE-2016-0792 a vulnerability in Jenkins versions older than 1.650 and Jenkins LTS versions
older than 1.642.2 which is caused by unsafe deserialization in XStream with Groovy in the classpath,
which allows remote arbitrary code execution. The issue affects default installations. Authentication
is not required to exploit the vulnerability.
older than 1.642.2 which is caused by unsafe deserialization in XStream with Groovy in the classpath,
which allows remote arbitrary code execution. The issue affects default installations. Authentication
is not required to exploit the vulnerability.
Authors
Arshan Dabirsiaghi
Matt Byrne attackdebris@gmail.com
Matt Byrne attackdebris@gmail.com
Platform
Linux,Unix,Windows
Architectures
cmd, python, x86, x64
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.