Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

From S3 bucket to Jenkins credential dump

Type
Research
Actors
Pub. date
January 13, 2022
Initial access
Web vulnerabilityCloud native misconfig
Impact
Resp. disclosure
Observed techniques
Credential theft
Targeted technologies
Jenkins
References
https://research.nccgroup.com/2022/01/13/10-real-world-stories-of-how-weve-compromised-ci-cd-pipelines/
Status
Finalized
Last edited
Jun 2, 2024 8:02 AM

NCC Group performed a pentest against a web application, in which they leveraged anonymous access to discover a sitemap folder that turned out to be an S3 bucket with directory listing enabled. NCC identified a bash script containing a hardcoded Git credential, which granted access to a Jenkins server as a limited user, but the researchers managed to escalate their privileges to admin and then proceeded to dump credentials including AWS access tokens, SSH certificates and more.

Made with 💙 by Wiz

Last Updated: April 3, 2025