Understanding Jenkins unauthenticated RCE

Chaining the ACL bypass vulnerability with the sandbox bypass gives us remote code execution (RCE). Metasploit already has a module that exploits these vulnerabilities and executes our shellcode. Let's take a look how it can be used before we learn about how the exploit works:

  1. We can load the exploit module by using the following command in msfconsole:
use exploit/multi/http/jenkins_metaprogramming
  1. The following screenshot shows the output of the preceding command:
  1. Next, we set the required options and run the exploit, as shown in the following screenshot:
  1. Now that we have a reverse shell, ...

Get Hands-On Web Penetration Testing with Metasploit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.