漏洞描述
Jenkins credentials of admin:admin were discovered.
id: jenkins-weak-password
info:
name: Jenkins Default Login
author: Zandros0
severity: high
description: Jenkins credentials of admin:admin were discovered.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cwe-id: CWE-522
cpe: cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
metadata:
product: jenkins
vendor: jenkins
shodan-query:
- cpe:"cpe:2.3:a:jenkins:jenkins"
- http.favicon.hash:"81586312"
- product:"jenkins"
- x-jenkins
- title:"Jenkins"
max-request: 3
tags: jenkins,default-login,vuln
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
- |
POST /j_spring_security_check HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
j_username=admin&j_password=admin&from=%2F&Submit=Sign+in
- |
GET / HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body_3, "/logout")'
- 'contains(body_3, "<title>Dashboard -") || contains(body_3, "Dashboard [Jenkins]")'
condition: and
# digest: 490a0046304402205a24d467257670c8b6fe225fae24f77e6fc3ed9665a8f362e626301104dd777f022029f4b907bdf527b318a55f748ac58fe7b91a815d5d99cd27708bccf73ee5b5b5:922c64590222798bb761d5b6d8e72950