nuclei-templates/http/vulnerabilities/jenkins/jenkins-stack-trace.yaml

33 lines
932 B
YAML
Raw Normal View History

id: jenkins-stack-trace
2020-12-26 17:48:55 +00:00
info:
name: Detect Jenkins in Debug Mode with Stack Traces Enabled
2021-06-09 12:20:56 +00:00
author: Dheerajmadhukar
2020-12-26 17:48:55 +00:00
severity: low
description: Module identified that the affected host is running an instance of Jenkins in debug mode, as a result stack traces are enabled.
reference:
- https://hackerone.com/reports/221833
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: jenkins,hackerone
2020-12-26 18:26:12 +00:00
http:
2020-12-26 17:48:55 +00:00
- method: GET
path:
- "{{BaseURL}}/adjuncts/3a890183/"
2020-12-26 18:26:12 +00:00
2020-12-26 17:48:55 +00:00
matchers-condition: and
matchers:
- type: word
words:
- "java.lang.StringIndexOutOfBoundsException"
- "String index out of range"
part: body
2021-03-10 14:03:49 +00:00
condition: and
2020-12-26 17:48:55 +00:00
- type: status
status:
- 500
# digest: 4b0a0048304602210090ecedd6e0a611f869394ae2afb7ee2b8fff8fed8cbfff1998250e38da3c79b9022100968c144032a3920ab6ce1e034b707724c5ddc8697cb6c3b1514d1233d75f6022:922c64590222798bb761d5b6d8e72950