SBN

Jenkins Master Post

A collection of posts on attacking Jenkins


http://www.labofapenetrationtester.com/2014/08/script-execution-and-privilege-esc-jenkins.html
Manipulating build steps to get RCE

https://medium.com/@uranium238/shodan-jenkins-to-get-rces-on-servers-6b6ec7c960e2
Using the terminal plugin to get RCE

https://sharadchhetri.com/2018/12/02/managing-jenkins-plugins/
Getting going with the jenkins-cli

https://github.com/Coalfire-Research/java-deserialization-exploits/tree/master/Jenkins
https://www.contrastsecurity.com/security-influencers/serialization-must-die-act-2-xstream
CVE-2015-8103 & CVE-2016-0792

https://blog.orange.tw/2019/01/hacking-jenkins-part-1-play-with-dynamic-routing.html
http://blog.orange.tw/2019/02/abusing-meta-programming-for-unauthenticated-rce.html
unauth user enumeration jenkins <1 .38="" font="">
CVE-2019-1003000 (https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266)

vulns in: 

  • Pipeline: Declarative Plugin up to and including 1.3.4
  • Pipeline: Groovy Plugin up to and including 2.61
  • Script Security Plugin up to and including 1.49
CVE-2017-1000353 PoC

CVE-2018-1999002 (windows) Arbitrary file read
A arbitrary file read vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework’

Under Windows, directories that don’t exist can be traversed by ../, but not for Linux. Then this vulnerability can be read by any file under Windows. Under Linux, you need to have a directory with _ in the Jenkins plugins directory.


Decrypting credentials.xml

Jenkins, windows, powershell

CVE-2018-1999001
malformed request moves the config.xml file, after restart anyone can log in – couple it with a DoS (CVE-2018-1999043) to force restart

affected version from Jenkins advisory:
  • Jenkins weekly up to and including 2.132
  • Jenkins LTS up to and including 2.121.1
  • blog post says: This issue has been fixed in Jenkins version 2.121.1 LTS (2.132 weekly).


CG Posts:

todo



*** This is a Security Bloggers Network syndicated blog from Carnal0wnage &amp; Attack Research Blog authored by CG. Read the original post at: http://carnal0wnage.attackresearch.com/2019/02/jenkins-master-post.html

Secure Guardrails