### [CVE-2016-0792](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0792) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando. ### POC #### Reference - https://www.exploit-db.com/exploits/42394/ - https://www.exploit-db.com/exploits/43375/ #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/0xh4di/PayloadsAllTheThings - https://github.com/3vikram/Application-Vulnerabilities-Payloads - https://github.com/84KaliPleXon3/Payloads_All_The_Things - https://github.com/ARPSyndicate/cvemon - https://github.com/AlexisRippin/java-deserialization-exploits - https://github.com/Aviksaikat/CVE-2016-0792 - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/Coalfire-Research/java-deserialization-exploits - https://github.com/Delishsploits/PayloadsAndMethodology - https://github.com/GhostTroops/TOP - https://github.com/GuynnR/Payloads - https://github.com/JERRY123S/all-poc - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Maarckz/PayloadParaTudo - https://github.com/Miraitowa70/POC-Notes - https://github.com/Muhammd/Awesome-Payloads - https://github.com/Nieuport/PayloadsAllTheThings - https://github.com/Pav-ksd-pl/PayloadsAllTheThings - https://github.com/R0B1NL1N/Java_Deserialization_exploits - https://github.com/R0B1NL1N/java-deserialization-exploits - https://github.com/Ra7mo0on/PayloadsAllTheThings - https://github.com/Shadowshusky/java-deserialization-exploits - https://github.com/TheBeastofwar/JenkinsExploit-GUI - https://github.com/Threekiii/Awesome-POC - https://github.com/XPR1M3/Payloads_All_The_Things - https://github.com/andrysec/PayloadsAllVulnerability - https://github.com/angelwhu/XStream_unserialization - https://github.com/anhtu97/PayloadAllEverything - https://github.com/anquanscan/sec-tools - https://github.com/apkadmin/PayLoadsAll - https://github.com/brianwrf/hackUtils - https://github.com/chanchalpatra/payload - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/falocab/PayloadsAllTheThings - https://github.com/hellochunqiu/PayloadsAllTheThings - https://github.com/hktalent/Scan4all_Pro - https://github.com/hktalent/TOP - https://github.com/jbmihoub/all-poc - https://github.com/jpiechowka/jenkins-cve-2016-0792 - https://github.com/koutto/jok3r-pocs - https://github.com/ksw9722/PayloadsAllTheThings - https://github.com/lnick2023/nicenice - https://github.com/lp008/Hack-readme - https://github.com/mrhacker51/ReverseShellCommands - https://github.com/nevidimk0/PayloadsAllTheThings - https://github.com/onewinner/VulToolsKit - https://github.com/orgTestCodacy11KRepos110MB/repo-5832-java-deserialization-exploits - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/ranjan-prp/PayloadsAllTheThings - https://github.com/ravijainpro/payloads_xss - https://github.com/sobinge/--1 - https://github.com/sobinge/PayloadsAllTheThings - https://github.com/sobinge/PayloadsAllThesobinge - https://github.com/superfish9/pt - https://github.com/weeka10/-hktalent-TOP - https://github.com/winterwolf32/PayloadsAllTheThings - https://github.com/xbl3/awesome-cve-poc_qazbnm456