mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 17:50:34 +00:00
77 lines
3.9 KiB
Markdown
77 lines
3.9 KiB
Markdown
![]() |
### [CVE-2015-8103](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8103)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/#jenkins
|
||
|
- http://packetstormsecurity.com/files/134805/Jenkins-CLI-RMI-Java-Deserialization.html
|
||
|
- https://www.exploit-db.com/exploits/38983/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0day404/vulnerability-poc
|
||
|
- https://github.com/0xh4di/PayloadsAllTheThings
|
||
|
- https://github.com/3vikram/Application-Vulnerabilities-Payloads
|
||
|
- https://github.com/84KaliPleXon3/Payloads_All_The_Things
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
|
||
|
- https://github.com/AlexisRippin/java-deserialization-exploits
|
||
|
- https://github.com/BLACKHAT-SSG/Pwn_Jenkins
|
||
|
- https://github.com/BrittanyKuhn/javascript-tutorial
|
||
|
- https://github.com/Coalfire-Research/java-deserialization-exploits
|
||
|
- https://github.com/Delishsploits/PayloadsAndMethodology
|
||
|
- https://github.com/EdoardoVignati/java-deserialization-of-untrusted-data-poc
|
||
|
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
|
||
|
- https://github.com/GuynnR/Payloads
|
||
|
- https://github.com/KayCHENvip/vulnerability-poc
|
||
|
- https://github.com/Miraitowa70/POC-Notes
|
||
|
- https://github.com/Muhammd/Awesome-Payloads
|
||
|
- https://github.com/NCSU-DANCE-Research-Group/CDL
|
||
|
- https://github.com/Nieuport/PayloadsAllTheThings
|
||
|
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
|
||
|
- https://github.com/Pav-ksd-pl/PayloadsAllTheThings
|
||
|
- https://github.com/PwnAwan/Pwn_Jenkins
|
||
|
- https://github.com/R0B1NL1N/Java_Deserialization_exploits
|
||
|
- https://github.com/R0B1NL1N/java-deserialization-exploits
|
||
|
- https://github.com/Ra7mo0on/PayloadsAllTheThings
|
||
|
- https://github.com/Rajchowdhury420/Secure-or-Break-Jenkins
|
||
|
- https://github.com/Shadowshusky/java-deserialization-exploits
|
||
|
- https://github.com/TheBeastofwar/JenkinsExploit-GUI
|
||
|
- https://github.com/Threekiii/Awesome-POC
|
||
|
- https://github.com/XPR1M3/Payloads_All_The_Things
|
||
|
- https://github.com/andrysec/PayloadsAllVulnerability
|
||
|
- https://github.com/anhtu97/PayloadAllEverything
|
||
|
- https://github.com/apkadmin/PayLoadsAll
|
||
|
- https://github.com/arshtepe/jenkins-serialization-vulnerability-exploit
|
||
|
- https://github.com/chanchalpatra/payload
|
||
|
- https://github.com/cved-sources/cve-2015-8103
|
||
|
- https://github.com/d4n-sec/d4n-sec.github.io
|
||
|
- https://github.com/falocab/PayloadsAllTheThings
|
||
|
- https://github.com/gquere/pwn_jenkins
|
||
|
- https://github.com/gregt114/cryptid564
|
||
|
- https://github.com/hellochunqiu/PayloadsAllTheThings
|
||
|
- https://github.com/jiangsir404/POC-S
|
||
|
- https://github.com/klausware/Java-Deserialization-Cheat-Sheet
|
||
|
- https://github.com/koutto/jok3r-pocs
|
||
|
- https://github.com/ksw9722/PayloadsAllTheThings
|
||
|
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||
|
- https://github.com/mrhacker51/ReverseShellCommands
|
||
|
- https://github.com/nevidimk0/PayloadsAllTheThings
|
||
|
- https://github.com/orgTestCodacy11KRepos110MB/repo-5832-java-deserialization-exploits
|
||
|
- https://github.com/r00t4dm/Jenkins-CVE-2015-8103
|
||
|
- https://github.com/ranjan-prp/PayloadsAllTheThings
|
||
|
- https://github.com/ravijainpro/payloads_xss
|
||
|
- https://github.com/retr0-13/pwn_jenkins
|
||
|
- https://github.com/sobinge/--1
|
||
|
- https://github.com/sobinge/PayloadsAllTheThings
|
||
|
- https://github.com/sobinge/PayloadsAllThesobinge
|
||
|
- https://github.com/superfish9/pt
|
||
|
- https://github.com/winterwolf32/PayloadsAllTheThings
|
||
|
|