jenkins

2 articles
Sort: New Top Best
clear filter
0

A Jenkins instance was found vulnerable to RCE due to improper access control, allowing unauthenticated users to gain admin access via GitHub OAuth and execute arbitrary Groovy scripts. The vulnerability was discovered during subdomain enumeration and responsibly disclosed to the organization's CTO.

Jenkins GitHub DoSomething.org MuhammadKhizerJaved nahamsec Matt HackerOne Bugcrowd
blog.securitybreached.org · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0 8/10

Researchers automated Java deserialization gadget chain discovery using LLM-driven analysis combined with static call graph analysis, discovering novel chains against WildFly and other application servers. The methodology uses WALA-based call graph construction, dynamic bytecode analysis for type confusion, and Claude Code to iteratively explore and validate gadget chains through a REST API query interface.

ysoserial GadgetInspector Claude Code IBM Watson Libraries for Analysis (WALA) CFR Java ASM FastAPI SQLite WildFly WebLogic WebSphere JBoss Jenkins OpenNMS Foxglove Security
atredis.com · Stephen Breen · 4 hours ago · details