projectdiscovery / nuclei-templates

Community curated list of templates for the nuclei engine to find security vulnerabilities.
https://github.com/projectdiscovery/nuclei
MIT License
9.35k stars 2.65k forks source link

CVE-2019-1003000 - Jenkins Sandbox Bypass Vulnerability #10892

Closed princechaddha closed 3 weeks ago

princechaddha commented 1 month ago

Is there an existing template for this?

Template requests

Description: A sandbox bypass vulnerability exists in the Jenkins Script Security Plugin (versions 1.49 and earlier) within src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java. This flaw allows attackers with permission to submit sandboxed scripts to execute arbitrary code on the Jenkins master JVM, potentially compromising the entire Jenkins environment.

Severity: High (CVSS: 8.8) CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

POC:

References:

Shodan Query: No available Shodan query.

CPE:

Anything else?

No response

princechaddha commented 1 month ago

/bounty $100

algora-pbc[bot] commented 1 month ago

💎 $100 bounty • ProjectDiscovery Bounty Available for CVE Template Contribution

Steps to Contribute:

Thank you for contributing to projectdiscovery/nuclei-templates and helping us democratize security!

Acceptance Criteria: The template must include a complete POC and should not rely solely on version-based detection. Contributors are required to provide debug data(-debug) along with the template to help the triage team with validation. Rewards will only be given once the template is fully validated by the team. Templates that are incomplete or invalid will not be accepted. You can check the FAQ for the Nuclei Templates Community Rewards Program here.

Add a bountyShare on socials

Attempt Started (GMT+0) Solution
🔴 @mobley-trent Oct 16, 2024, 9:01:30 AM WIP
🔴 @daffainfo Oct 23, 2024, 12:58:03 PM WIP
🟢 @sttlr Oct 24, 2024, 11:59:08 AM #11095
mobley-trent commented 1 month ago

/attempt #10892

Algora profile Completed bounties Tech Active attempts Options
@mobley-trent 10 bounties from 5 projects
Python, Rust,
Jupyter Notebook
Cancel attempt
algora-pbc[bot] commented 1 month ago

@mobley-trent: Reminder that in 4 days the bounty will become up for grabs, so please submit a pull request before then 🙏

daffainfo commented 1 month ago

/attempt #10892

algora-pbc[bot] commented 1 month ago

[!NOTE] The user @mobley-trent is already attempting to complete issue #10892 and claim the bounty. We recommend checking in on @mobley-trent's progress, and potentially collaborating, before starting a new solution.

algora-pbc[bot] commented 1 month ago

The bounty is up for grabs! Everyone is welcome to /attempt #10892 🙌

sttlr commented 1 month ago

/attempt #10892

Algora profile Completed bounties Tech Active attempts Options
@sttlr 1 projectdiscovery bounty
JavaScript, Shell,
Go & more
Cancel attempt
algora-pbc[bot] commented 1 month ago

💡 @sttlr submitted a pull request that claims the bounty. You can visit your bounty board to reward.

algora-pbc[bot] commented 3 weeks ago

@sttlr: You've been awarded a $100 bounty by projectdiscovery! 👉 Complete your Algora onboarding to collect the bounty.