Chaining the ACL bypass vulnerability with the sandbox bypass gives us remote code execution (RCE). Metasploit already has a module that exploits these vulnerabilities and executes our shellcode. Let's take a look how it can be used before we learn about how the exploit works:
- We can load the exploit module by using the following command in msfconsole:
use exploit/multi/http/jenkins_metaprogramming
- The following screenshot shows the output of the preceding command:
- Next, we set the required options and run the exploit, as shown in the following screenshot:
- Now that we have a reverse shell, ...