Merge pull request #7388 from projectdiscovery/new-endpoint-jenkins
Update jenkins-script.yamlpatch-1
commit
42302a23c3
|
@ -2,12 +2,13 @@ id: jenkins-script
|
|||
|
||||
info:
|
||||
name: Jenkins - Remote Code Execution
|
||||
author: philippedelteil
|
||||
author: philippedelteil,DhiyaneshDK
|
||||
severity: critical
|
||||
description: |
|
||||
Jenkins is susceptible to a remote code execution vulnerability due to accessible script functionality.
|
||||
reference:
|
||||
- https://hackerone.com/reports/403402
|
||||
- https://medium.com/@gokulsspace/the-30000-bounty-affair-3f025ee6b834
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
||||
cvss-score: 10.0
|
||||
|
@ -20,7 +21,9 @@ http:
|
|||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/script/"
|
||||
- "{{BaseURL}}/jenkins/script"
|
||||
|
||||
stop-at-first-match: true
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
|
@ -38,5 +41,3 @@ http:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/05/26
|
||||
|
|
Loading…
Reference in New Issue