Open sagarwal395 opened 2 months ago
Hi @sagarwal395
Does this require project_name
, search_string
inputs supplied via variable option in CLI ?
Looking forward to hear back from you
Thanks
Hi @DhiyaneshGeek,
Yes it does. It also requires the username and password of attackers with Item/Read permission. On a high level the issue is that the sensitive build variables like password are not excluded from search in build history and an attacker can fuzz through to get passwords used in any builds.
@sagarwal395
any docker setup instructions ?
@sagarwal395
any docker setup instructions ?
As of now no. Sorry have been busy with school. I will share the instructions for docker once ready. If you wanna quickly test it here are the steps:
Template Information:
Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.
References: https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3261 http://www.openwall.com/lists/oss-security/2023/09/20/5
Nuclei Template:
Expected output: