A collection of notes, scripts, and techniques for exploiting vulnerabilities and attacking Jenkins servers.
pwn_jenkins is a security research repository focused on attacking Jenkins automation servers. It documents critical vulnerabilities, provides exploitation scripts, and details post-compromise techniques for red teamers and penetration testers. The project serves as a practical guide for assessing and exploiting insecure Jenkins deployments.
Security researchers, penetration testers, and red team operators who need to audit or exploit Jenkins servers in authorized engagements.
It consolidates scattered Jenkins attack vectors into a single, actionable resource with working exploit code and scripts, saving time for security professionals during assessments.
Notes about attacking Jenkins servers
Documents critical vulnerabilities like CVE-2024-23897 and CVE-2019-1003000 with detailed exploitation commands and scripts, saving research time.
Provides ready-to-use Python scripts for dumping build logs and decrypting secrets offline, as shown in the repository's scripts directory.
Includes Groovy scripts for command execution and reverse shells, with examples for automating attacks on specific slave nodes.
Emphasizes actionable code over theory, offering clear examples like memory dumping for LDAP credentials and password spraying techniques.
Purely offensive; lacks any mitigation strategies, patching advice, or security best practices for securing Jenkins servers.
Requires familiarity with penetration testing tools and Jenkins internals; not beginner-friendly, with minimal explanatory context.
Focuses on known CVEs up to a point; may not cover newer exploits or zero-days, and scripts might need updates for newer Jenkins versions.
Intended for authorized use only; unauthorized application could lead to legal issues, and the README offers no disclaimers on responsible usage.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.