Closed princechaddha closed 3 weeks ago
/bounty $100
/attempt #10892
on this issue to claim attempt.#10892
in the PR body to claim the bounty.Thank you for contributing to projectdiscovery/nuclei-templates and helping us democratize security!
Acceptance Criteria: The template must include a complete POC and should not rely solely on version-based detection. Contributors are required to provide debug data(
-debug
) along with the template to help the triage team with validation. Rewards will only be given once the template is fully validated by the team. Templates that are incomplete or invalid will not be accepted. You can check the FAQ for the Nuclei Templates Community Rewards Program here.
Add a bounty • Share on socials
Attempt | Started (GMT+0) | Solution |
---|---|---|
🔴 @mobley-trent | Oct 16, 2024, 9:01:30 AM | WIP |
🔴 @daffainfo | Oct 23, 2024, 12:58:03 PM | WIP |
🟢 @sttlr | Oct 24, 2024, 11:59:08 AM | #11095 |
/attempt #10892
Algora profile | Completed bounties | Tech | Active attempts | Options |
---|---|---|---|---|
@mobley-trent | 10 bounties from 5 projects | Python, Rust, Jupyter Notebook |
Cancel attempt |
@mobley-trent: Reminder that in 4 days the bounty will become up for grabs, so please submit a pull request before then 🙏
/attempt #10892
[!NOTE] The user @mobley-trent is already attempting to complete issue #10892 and claim the bounty. We recommend checking in on @mobley-trent's progress, and potentially collaborating, before starting a new solution.
The bounty is up for grabs! Everyone is welcome to /attempt #10892
🙌
/attempt #10892
Algora profile | Completed bounties | Tech | Active attempts | Options |
---|---|---|---|---|
@sttlr | 1 projectdiscovery bounty | JavaScript, Shell, Go & more |
Cancel attempt |
💡 @sttlr submitted a pull request that claims the bounty. You can visit your bounty board to reward.
@sttlr: You've been awarded a $100 bounty by projectdiscovery! 👉 Complete your Algora onboarding to collect the bounty.
Is there an existing template for this?
Template requests
Description: A sandbox bypass vulnerability exists in the Jenkins Script Security Plugin (versions 1.49 and earlier) within src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java. This flaw allows attackers with permission to submit sandboxed scripts to execute arbitrary code on the Jenkins master JVM, potentially compromising the entire Jenkins environment.
Severity: High (CVSS: 8.8) CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
POC:
References:
Shodan Query: No available Shodan query.
CPE:
Anything else?
No response