From 03993005fba4bbf01601be80bb4518a0eb373b98 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 31 May 2022 14:11:09 +0530 Subject: [PATCH] Update jenkins-script.yaml --- vulnerabilities/jenkins/jenkins-script.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/jenkins/jenkins-script.yaml b/vulnerabilities/jenkins/jenkins-script.yaml index b97ac9e503..85c87aff9e 100644 --- a/vulnerabilities/jenkins/jenkins-script.yaml +++ b/vulnerabilities/jenkins/jenkins-script.yaml @@ -4,7 +4,8 @@ info: name: Jenkins - Remote Code Execution author: philippedelteil severity: critical - description: Jenkins is susceptible to a remote code execution vulnerability due to accessible script functionality. + description: | + Jenkins is susceptible to a remote code execution vulnerability due to accessible script functionality. reference: - https://hackerone.com/reports/403402 classification: @@ -18,14 +19,16 @@ requests: - method: GET path: - "{{BaseURL}}/script/" + matchers-condition: and matchers: - type: word + part: body words: - "println(Jenkins.instance.pluginManager.plugins)" - "Scriptconsole" condition: and - part: body + - type: status status: - 200