You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
The remoting module in Jenkins prior to version 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code by sending a crafted serialized Java object. This vulnerability triggers an LDAP query to a third-party server, enabling remote code execution.
@princechaddha Is this template still valid for bounty? I went https://console.algora.io/org/projectdiscovery/bounties?status=open and still see this issue. In addition, i already have template for this, but i could not manage to use with interactsh-url because when i use {{interactsh-url}} to construct a variable like ldapurl: "ldap://{{interactsh-url}}:1389" it would not resolve variable and keeps braces as string
Is there an existing template for this?
Template requests
Description:
The remoting module in Jenkins prior to version 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code by sending a crafted serialized Java object. This vulnerability triggers an LDAP query to a third-party server, enabling remote code execution.
Severity: Critical
POC:
References:
Shodan Query: http.favicon.hash:81586312
CPE:
cpe:2.3:a:jenkins:jenkins:::::lts:::*
cpe:2.3:a:jenkins:jenkins:::::-:::*
cpe:2.3:o:fedoraproject:fedora:25:::::::*
Anything else?
No response
The text was updated successfully, but these errors were encountered: