Skip to content

Commit

Permalink
Merge pull request #81 from yaronav/master
Browse files Browse the repository at this point in the history
Updated broken link to new hosting
  • Loading branch information
carlospolop authored Aug 21, 2024
2 parents 87f91ab + 7cbf280 commit 8188cc3
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion pentesting-ci-cd/jenkins-security/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@ Many organizations combine **SaaS-based source control management (SCM) systems*

To achieve this, organizations **whitelist** the **IP ranges** of the **SCM platforms**, permitting them to access the **internal CI system** via **webhooks**. However, it's important to note that **anyone** can create an **account** on GitHub or GitLab and configure it to **trigger a webhook**, potentially sending requests to the **internal CI system**.

Check: [shttps://www.cidersecurity.io/blog/research/how-we-abused-repository-webhooks-to-access-internal-ci-systems-at-scale/](https://www.cidersecurity.io/blog/research/how-we-abused-repository-webhooks-to-access-internal-ci-systems-at-scale/)
Check: [https://www.paloaltonetworks.com/blog/prisma-cloud/repository-webhook-abuse-access-ci-cd-systems-at-scale/](https://www.paloaltonetworks.com/blog/prisma-cloud/repository-webhook-abuse-access-ci-cd-systems-at-scale//)

## Internal Jenkins Abuses

Expand Down

0 comments on commit 8188cc3

Please sign in to comment.