parent
24143f812c
commit
bdb8d3b9e6
|
@ -60413,6 +60413,68 @@
|
|||
"notes": {
|
||||
}
|
||||
},
|
||||
"exploit_multi/http/jenkins_metaprogramming": {
|
||||
"name": "Jenkins ACL Bypass and Metaprogramming RCE",
|
||||
"full_name": "exploit/multi/http/jenkins_metaprogramming",
|
||||
"rank": 600,
|
||||
"disclosure_date": "2019-01-08",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"Orange Tsai",
|
||||
"wvu <wvu@metasploit.com>"
|
||||
],
|
||||
"description": "This module exploits a vulnerability in Jenkins dynamic routing to\n bypass the Overall/Read ACL and leverage Groovy metaprogramming to\n download and execute a malicious JAR file.\n\n The ACL bypass gadget is specific to Jenkins <= 2.137 and will not work\n on later versions of Jenkins.\n\n Tested against Jenkins 2.137 and Pipeline: Groovy Plugin 2.61.",
|
||||
"references": [
|
||||
"CVE-2019-1003000",
|
||||
"CVE-2019-1003001",
|
||||
"CVE-2019-1003002",
|
||||
"EDB-46427",
|
||||
"URL-https://jenkins.io/security/advisory/2019-01-08/",
|
||||
"URL-https://blog.orange.tw/2019/01/hacking-jenkins-part-1-play-with-dynamic-routing.html",
|
||||
"URL-https://blog.orange.tw/2019/02/abusing-meta-programming-for-unauthenticated-rce.html",
|
||||
"URL-https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc"
|
||||
],
|
||||
"platform": "Java",
|
||||
"arch": "java",
|
||||
"rport": 8080,
|
||||
"autofilter_ports": [
|
||||
80,
|
||||
8080,
|
||||
443,
|
||||
8000,
|
||||
8888,
|
||||
8880,
|
||||
8008,
|
||||
3000,
|
||||
8443
|
||||
],
|
||||
"autofilter_services": [
|
||||
"http",
|
||||
"https"
|
||||
],
|
||||
"targets": [
|
||||
"Jenkins <= 2.137 (Pipeline: Groovy Plugin <= 2.61)"
|
||||
],
|
||||
"mod_time": "2019-03-16 13:35:54 +0000",
|
||||
"path": "/modules/exploits/multi/http/jenkins_metaprogramming.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "multi/http/jenkins_metaprogramming",
|
||||
"check": true,
|
||||
"post_auth": false,
|
||||
"default_credential": false,
|
||||
"notes": {
|
||||
"Stability": [
|
||||
"crash-safe"
|
||||
],
|
||||
"SideEffects": [
|
||||
"ioc-in-logs",
|
||||
"artifacts-on-disk"
|
||||
],
|
||||
"Reliability": [
|
||||
"repeatable-session"
|
||||
]
|
||||
}
|
||||
},
|
||||
"exploit_multi/http/jenkins_script_console": {
|
||||
"name": "Jenkins-CI Script-Console Java Execution",
|
||||
"full_name": "exploit/multi/http/jenkins_script_console",
|
||||
|
|
Loading…
Reference in New Issue