module
Jenkins ACL Bypass and Metaprogramming RCE
Disclosed | Created |
---|---|
01/08/2019 | 03/19/2019 |
Disclosed
01/08/2019
Created
03/19/2019
Description
This module exploits a vulnerability in Jenkins dynamic routing to
bypass the Overall/Read ACL and leverage Groovy metaprogramming to
download and execute a malicious JAR file.
When the "Java Dropper" target is selected, the original entry point
based on classLoader.parseClass is used, which requires the use of
Groovy metaprogramming to achieve RCE.
When the "Unix In-Memory" target is selected, a newer, higher-level,
and more universal entry point based on GroovyShell.parse is used.
This permits the use of in-memory arbitrary command execution.
The ACL bypass gadget is specific to Jenkins on later versions of Jenkins.
Tested against Jenkins 2.137 and Pipeline: Groovy Plugin 2.61.
bypass the Overall/Read ACL and leverage Groovy metaprogramming to
download and execute a malicious JAR file.
When the "Java Dropper" target is selected, the original entry point
based on classLoader.parseClass is used, which requires the use of
Groovy metaprogramming to achieve RCE.
When the "Unix In-Memory" target is selected, a newer, higher-level,
and more universal entry point based on GroovyShell.parse is used.
This permits the use of in-memory arbitrary command execution.
The ACL bypass gadget is specific to Jenkins on later versions of Jenkins.
Tested against Jenkins 2.137 and Pipeline: Groovy Plugin 2.61.
Authors
Orange TsaiMikhail EgorovGeorge Noseevichwvu
Platform
Java,Unix
Architectures
cmd, java
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use exploit/multi/http/jenkins_metaprogramming msf /(g) > show actions ...actions... msf /(g) > set ACTION < action-name > msf /(g) > show options ...show and set options... msf /(g) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.