mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
2.4 KiB
2.4 KiB
CVE-2019-1003029
Description
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM.
POC
Reference
Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/BLACKHAT-SSG/Pwn_Jenkins
- https://github.com/Cashiuus/jenkins-checkscript-rce
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/N0body007/jenkins-rce-2017-2018-2019
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/PetrusViet/Jenkins-bypassSandBox-RCE
- https://github.com/PwnAwan/Pwn_Jenkins
- https://github.com/Rajchowdhury420/Secure-or-Break-Jenkins
- https://github.com/TheBeastofwar/JenkinsExploit-GUI
- https://github.com/Tyro-Shan/gongkaishouji
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/ZTK-009/Penetration_PoC
- https://github.com/alphaSeclab/sec-daily-2019
- https://github.com/gquere/pwn_jenkins
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/huike007/penetration_poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/onewinner/VulToolsKit
- https://github.com/orangetw/awesome-jenkins-rce-2019
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/retr0-13/pwn_jenkins
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji