尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Jenkins project | Script Security Plugin | 1.49 and earlier | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative) | https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc | POC详情 |
| 2 | Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins | https://github.com/slowmistio/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins | POC详情 |
| 3 | A C# module to detect if a Jenkins server is vulnerable to the RCE vulnerability found in CVE-2019-1003000 (chained with CVE-2018-1000861 for pre-auth RCE) | https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION | POC详情 |
| 4 | None | https://github.com/purple-WL/Jenkins_CVE-2019-1003000 | POC详情 |
| 5 | A sandbox bypass vulnerability exists in the Jenkins Script Security Plugin (versions 1.49 and earlier) within src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java. This flaw allows attackers with permission to submit sandboxed scripts to execute arbitrary code on the Jenkins master JVM, potentially compromising the entire Jenkins environment. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-1003000.yaml | POC详情 |
| 6 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Jenkins%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2019-1003000.md | POC详情 |
| 7 | None | https://github.com/andikahilmy/CVE-2019-1003000-script-security-plugin-vulnerable | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论