CVE-2017-1000353: Jenkins CLI – Java Deserialization

CVE-2017-1000353: Jenkins CLI - Java Deserialization-渗透云记 - 专注于网络安全与技术分享
CVE-2017-1000353: Jenkins CLI – Java Deserialization
此内容为付费阅读,请付费后查看
100积分
付费阅读

漏洞标题

CVE-2017-1000353: jenkins CLI – Java Deserialization

漏洞描述

Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.

PoC代码

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享