You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
The remoting module in Jenkins prior to version 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code by sending a crafted serialized Java object. This vulnerability triggers an LDAP query to a third-party server, enabling remote code execution.
💎 $200 bounty • ProjectDiscovery Bounty Available for CVE Template Contribution
Steps to Contribute:
Claim attempt: Comment /attempt #10894 on this issue to claim attempt.
Write the Template: Create a high-quality Nuclei template for the specified CVE, following our Contribution Guidelines and Acceptance Criteria.
Submit the Template: Open a pull request (PR) to projectdiscovery/nuclei-templates and include /claim #10894 in the PR body to claim the bounty.
Receive Payment: Upon successful merge of your PR, you will receive 100% of the bounty through Algora.io within 2-5 days. Ensure you are eligible for payouts.
Thank you for contributing to projectdiscovery/nuclei-templates and helping us democratize security!
Acceptance Criteria: The template must include a complete POC and should not rely solely on version-based detection. Contributors are required to provide debug data(-debug) along with the template to help the triage team with validation. Rewards will only be given once the template is fully validated by the team. Templates that are incomplete or invalid will not be accepted. You can check the FAQ for the Nuclei Templates Community Rewards Program here.
Is there an existing template for this?
Template requests
Description:
The remoting module in Jenkins prior to version 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code by sending a crafted serialized Java object. This vulnerability triggers an LDAP query to a third-party server, enabling remote code execution.
Severity: Critical
POC:
References:
Shodan Query: http.favicon.hash:81586312
CPE:
cpe:2.3:a:jenkins:jenkins:::::lts:::*
cpe:2.3:a:jenkins:jenkins:::::-:::*
cpe:2.3:o:fedoraproject:fedora:25:::::::*
Anything else?
No response
The text was updated successfully, but these errors were encountered: