mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
37 lines
1.5 KiB
Markdown
37 lines
1.5 KiB
Markdown
![]() |
### [CVE-2019-10392](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10392)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Jenkins Git Client Plugin 2.8.4 and earlier and 3.0.0-rc did not properly restrict values passed as URL argument to an invocation of 'git ls-remote', resulting in OS command injection.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
No PoCs from references.
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/20142995/sectool
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Awrrays/FrameVul
|
||
|
- https://github.com/BLACKHAT-SSG/Pwn_Jenkins
|
||
|
- https://github.com/PwnAwan/Pwn_Jenkins
|
||
|
- https://github.com/Rajchowdhury420/Secure-or-Break-Jenkins
|
||
|
- https://github.com/Retr0-ll/2023-littleTerm
|
||
|
- https://github.com/Retr0-ll/littleterm
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/ftk-sostupid/CVE-2019-10392_EXP
|
||
|
- https://github.com/gquere/pwn_jenkins
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
- https://github.com/jas502n/CVE-2019-10392
|
||
|
- https://github.com/lnick2023/nicenice
|
||
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||
|
- https://github.com/r0eXpeR/redteam_vul
|
||
|
- https://github.com/retr0-13/pwn_jenkins
|
||
|
- https://github.com/tdcoming/Vulnerability-engine
|
||
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
||
|
|