9.8
CVSSv3

CVE-2024-23897

Published: 24/01/2024 Updated: 07/03/2024
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Jenkins 2.441 and previous versions, LTS 2.426.2 and previous versions does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated malicious users to read arbitrary files on the Jenkins controller file system.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins jenkins

Vendor Advisories

Synopsis Important: jenkins and jenkins-2-plugins security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for jenkins and jenkins-2-plugins is now available for OpenShift Developer Tools and Services for ...
Synopsis Important: Jenkins and Jenkins-2-plugins security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for Jenkins and Jenkins-2-plugins is now available for OpenShift Developer Tools and Services for ...
Synopsis Important: jenkins and jenkins-2-plugins security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for jenkins and jenkins-2-plugins is now available for OpenShift Developer Tools and Services for ...
Check Point Reference: CPAI-2024-0020 Date Published: 28 Jan 2024 Severity: High ...

Exploits

Jenkins version 2441 suffers from a local file inclusion vulnerability ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Multiple vulnerabilities in Jenkins and Jenkins plugins <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Daniel Be ...

Github Repositories

CVE-2024-23897 Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability Leading to RCE Jenkins uses the args4j library to parse command arguments and options on the Jenkins controller when processing CLI commands This command parser has a feature that replaces an @ character followed by a file path in an argument with the file’s contents (expandAtFiles) This feature is

Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE

Jenkins has a built-in command line interface (CLI) to access Jenkins from a script or shell environment Jenkins uses the args4j library to parse command arguments and options on the Jenkins controller when processing CLI commands This command parser has a feature that replaces an @ character followed by a file path in an argument with the file’s contents (expandAtFiles

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

CVE-2024-23897 Jenkins 2441 and earlier, LTS 24262 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system Exploitation Follow these steps to execute the explo

CVE-2024-23897

Using the client The general syntax for invoking the client is as follows: java -jar jenkins-clijar [-s JENKINS_URL] [global options] command [command options] [arguments] info :- wwwjenkinsio/doc/book/managing/cli/#downloading-the-client CVE :- wwwcvedetailscom/cve/CVE-2024-23897/

Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897]

CVE-2024-23897 Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897] Caution⚠️ Disclaimer: IMPORTANT: This script is provided for educational, ethical testing, and lawful use ONLY Do not use it on any system or network without explicit permission Unauthorized access to computer systems and networks is illegal, and users caught performing unauthorized activities are s

使用命令:python 3 CVE-2024-23897 py-l 2 txt-f/etc/passwd(把全球资源定位器(Uniform Resource Locator)写入2txt即可批量)

CVE-2024-23897

CVE-2024-23897 Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability Leading to RCE Jenkins uses the args4j library to parse command arguments and options on the Jenkins controller when processing CLI commands This command parser has a feature that replaces an @ character followed by a file path in an argument with the file’s contents (expandAtFiles) This feature is

PoC for Jenkins CVE-2024-23897

Jenkins CVE-2024-23897 PoC A proof-of-concept (PoC) for CVE-2024-23897, an arbitrary file read vulnerability in Jenkins' built-in command line interface (CLI) It allows unauthenticated attackers with Overall/Read permission to read arbitrary files on the Jenkins controller file system Affected Versions Jenkins versions &lt;= 2441 Jenkins LTS versions &lt;= 242

Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins.

CVE-2024-23897 Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins Usage python3 scrapingpy -u server:8080 -l /path/to/wordlist -o outputtxt

Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)

CVE-2024-23897 Nuclei Template For Exploit CVE-2024-23897 This template serves as a crucial warning to all users if the CVE-2024-23897 local file vulnerability is detected within your system, it is imperative to take immediate action and patch your systems without delay This vulnerability poses a significant risk to the security and integrity of your system, potentially all

Perform with massive Jenkins Reading-2-RCE

CVE-2024-23897: Jenkins Arbitrary File Read Vulnerability Leading to RCE Introduction This repository contains a Python script that exploits a critical vulnerability (CVE-2024-23897) in Jenkins, leading to arbitrary file read and remote code execution (RCE) This vulnerability allows an unauthenticated attacker to execute arbitrary commands on the target Jenkins server, potenti

CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner.

CVE-2024-23897 | Jenkins &lt;= 2441 &amp; &lt;= LTS 24262 PoC and scanner 📜 Description Exploitation and scanning tool specifically designed for Jenkins versions &lt;= 2441 &amp; &lt;= LTS 24262 It leverages CVE-2024-23897 to assess and exploit vulnerabilities in Jenkins instances 🚀 Usage Ensure you have the necessary permissions to scan a

Some scripts to enumerate and attack Jenkins servers

Jenkins_scripts Some scripts to enumerate and attack Jenkins servers Enumeration enum_accesspy This script can enumerate 26 different URLs and check if the user can access them If no user is especified, it will try perform authentication as the anonymous user enum_userspy This can be used to perform a dictionary attack to obtain possible usernames Either if Jenkins is conf

CVE-2024-23897 jenkins-cli

CVE-2024-23897 CVE-2024-23897 jenkins-cli We have seen Jenkins File Leak / RCE (CVE-2024-23897) exploited in the wild and managed to reproduce it If your Jenkins allows anonymous users or user registration, immediately update it to the latest version java -jar jenkins-clijar -s wwwwevulcom @/etc/passwd

poc-cve-2024-23897 this code is my attempt to write a proof of concept under cve 2024 23897 allows you to perform RCE on the attacked machine through the vulnerable args4j module how to use: go run pocgo 127001:8888/ [/etc/passwd

This is an exploit script for CVE-2024-23897, a vulnerability affecting certain systems. The script is intended for educational and testing purposes only. Ensure that you have the necessary permissions before using it.

Jenkins CVE-2024-23897 Exploit Script Description: This exploit script is designed to target Jenkins instances with versions &lt;= 2441 &amp; &lt;= LTS 24262 affected by the CVE-2024-23897 vulnerability The vulnerability originates from the args4j library used by Jenkins to parse command arguments and options during the processing of CLI commands on the Jenkins

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

Jenkins is an open source automation server It helps automate the parts of software development related to building, testing, and deploying, facilitating continuous integration, and continuous delivery CVE-2024-23897(Arbitrary File Read Vulnerability) Jenkins 2441 and earlier, LTS 24262 and earlier does not disable a feature of its CLI command parser that replaces an '

CVE-2024-23897 - Jenkins 任意文件读取 利用工具

CVE-2024-23897 - Jenkins 任意文件读取 利用工具 安装 CVE-2024-23897 需要go 121才能完成安装 执行以下命令 go install githubcom/wjlin0/CVE-2024-23897/cmd/CVE-2024-23897@latest 或者 安装完成的二进制文件在release中下载 macOS-arm64 macOS-amd64 linux-amd64 windows-amd64 windows-386

This repository presents a proof-of-concept of CVE-2024-23897

CVE-2024-23897 This repository presents a proof-of-concept of CVE-2024-23897 (Discovered by sonarsource) CVE-2024-23897 | File read in jenkins Disclamer This code is a proof of concept of the vulnerability, I'm not pushing anyone to use it on confluence instances they don't own This tool has been developed for research and educational purposes only and I will not be

Scanner for CVE-2024-23897 - Jenkins

CVE-2024-23897 ⚠️ This scanner is for defensive purposes and should be used by cybersecurity professionals to identify possible vulnerable Jenkins servers Description CVE-2024-23897 - Arbitrary file read vulnerability through the CLI can lead to RCE Products and Versions affected: Product Affected Versions Jenkis Server &lt;= 2441 &lt;= LTS 24263 CV

Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897

🤵🏻 CVE-2024-23897 Arbitrary-file-read 🤵🏻 Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897 🤖 🛠️ Este código Python presenta un escáner para una vulnerabilidad específica (CVE-2024-23897) en servidores Jenkins Comienza solicitando al usuario la URL del servidor Jenkins Luego, ofrece la opción de desc

Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897

🤵🏻 CVE-2024-23897 Arbitrary-file-read 🤵🏻 Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897 🤖 🛠️ Este código Python presenta un escáner para una vulnerabilidad específica (CVE-2024-23897) en servidores Jenkins Comienza solicitando al usuario la URL del servidor Jenkins Luego, ofrece la opción de desc

on this git you can find all information on the CVE-2024-23897

PoC-jenkins-rce_CVE-2024-23897 On this git you can find all information on the CVE-2024-23897 Introduction The issue, assigned the CVE identifier CVE-2024-23897, has been described as an arbitrary file read vulnerability through the built-in command line interface This command parser has a feature that replaces an @ character followed by a file path in an argument with

POC for CVE-2024-23897 Jenkins File-Read

CVE-2024-23897 Description: This Proof-of-Concept (POC) can be used to exploit CVE-2024-23897 to achieve file-read access on a Jenkins server &lt;= version 2441 Jenkins 2441 and earlier, LTS 24262 and earlier does not disable a feature of its CLI command parser that replaces an @ character followed by a file path in an argument with the file's contents, allowing u

on this git you can find all information on the CVE-2024-23897

PoC-jenkins-rce_CVE-2024-23897 On this git you can find all information on the CVE-2024-23897 Introduction The issue, assigned the CVE identifier CVE-2024-23897, has been described as an arbitrary file read vulnerability through the built-in command line interface This command parser has a feature that replaces an @ character followed by a file path in an argument with

on this git you can find all information on the CVE-2024-23897

PoC-jenkins-rce_CVE-2024-23897 On this git you can find all information on the CVE-2024-23897 Introduction The issue, assigned the CVE identifier CVE-2024-23897, has been described as an arbitrary file read vulnerability through the built-in command line interface This command parser has a feature that replaces an @ character followed by a file path in an argument with

📝 I regularly write articles on abraxaspagesdev 2024-02-04 | Jenkins CVE-2024-23897 2024-01-13 | HTB Zipping 2024-01-10 | HTB Sau 2023-12-16 | HTB Coder 2023-12-09 | HTB Authority

CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCE

CVE-2024-23897-RCE CVE-2024-23897 is an arbitrary file read vulnerability through the CLI can lead to unauthenticated RCE Vulnerability the jenkins CLI uses the args4j library which has the feature to access a file's content by using @ following the path of file which allows and attacker to read any file in the system, ** Attackers with Overall/Read permission can read en

poc-jenkins Valid for CVE-2024-23897 Official Security Advisory: wwwjenkinsio/security/advisory/2024-01-24/ Download jar wget /jnlpJars/jenkins-clijar Reading only one line Read Jenkins home directory | check HOME= java -jar jenkins-clijar -s -http help 1 "@/proc/self/environ" Read master key,"key encryption key", used to encrypt and decrypt key

Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability

CVE-2024-23897 Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability

CLI를 이용한 Jenkins 임의 파일 읽기 취약점(CVE-2024-23897) Jenkins는 오픈소스로 지속적 통합 서비스를 제공하는 도구입니다(자동화 서버)입니다 Jenkins에서는 args4j library를 사용하여 CLI 명령을 처리할 때 Jenkins 컨트롤러의 명령 인수와 옵션을 구문 분석합니다 이 명령 구문 분석기 @에는 인수

Recent Articles

Jenkins jitters as 45,000 servers still vulnerable to RCE attacks after patch released
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Multiple publicly available exploits have since been published for the critical flaw

The number of public-facing installs of Jenkins servers vulnerable to a recently disclosed critical vulnerability is in the tens of thousands. Scans from internet security data company Shadowserver indicate roughly 45,000 instances of the hugely popular CI/CD automation server are vulnerable to CVE-2024-23897, the critical flaw disclosed on January 24. The vast majority of exposures are contained to the US and China, with 15,806 and 11,955 vulnerable servers respectively. Trailing them are India...