Exploiting Jenkins
- by Vince
-
in Blog
-
Hits: 2473
I can't say that I've encountered Jenkins much in the real world but when I worked with large groups of developers they worked independently of each other and Jenkins probably could have helped with that problem but I digress -- that is no longer my world.
I've heard Jenkins mentioned in the context of pentesting larger organizations and I have two impressions: First, it's discovered frequently. Second, it's a sitting duck. I don't know either to be true but I've wanted to get familiar with it. I've seen it a few times but not in a situation where I could get a solid foothold.
Quick sidebar -- I met a red teamer who said he wanted to go through every single exploit in Metasploit to see how it worked. I understand that concept and this is basically what I'm doing here. Attack as many things as you can find, become familiar with how they work, and add that knowledge to your toolbox. It will aid you in pentesting and it will also aid you in securing these applications when you come across them.
I finally found a vulnerable version of Jenkins, version 1.637, and I wanted to work through every angle -- even if some are redundant.