nuclei-templates/vulnerabilities/jenkins/jenkins-stack-trace.yaml

32 lines
1.0 KiB
YAML
Raw Normal View History

2020-12-26 17:48:55 +00:00
id: jenkins-stack-traces
info:
name: Detect Jenkins in Debug Mode with Stack Traces Enabled
2021-06-09 12:20:56 +00:00
author: Dheerajmadhukar
2020-12-26 17:48:55 +00:00
severity: low
description: Module identified that the affected host is running an instance of Jenkins in debug mode, as a result stack traces are enabled.
2020-12-26 18:26:12 +00:00
reference: https://hackerone.com/reports/221833
tags: jenkins
2020-12-26 18:26:12 +00:00
2020-12-26 17:48:55 +00:00
requests:
- method: GET
path:
- "{{BaseURL}}/adjuncts/3a890183/"
2020-12-26 18:26:12 +00:00
2020-12-26 17:48:55 +00:00
headers:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Language: en-US,en;q=0.9,hi;q=0.8
User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Mobile Safari/537.36
2020-12-26 18:26:12 +00:00
2020-12-26 17:48:55 +00:00
matchers-condition: and
matchers:
- type: word
words:
- "java.lang.StringIndexOutOfBoundsException"
- "String index out of range"
part: body
2021-03-10 14:03:49 +00:00
condition: and
2020-12-26 17:48:55 +00:00
- type: status
status:
- 500