Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-23897

KEV · Ransomware EPSS 94.47% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-23897

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Jenkins 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Jenkins是Jenkins开源的一个应用软件。一个开源自动化服务器Jenkins提供了数百个插件来支持构建,部署和自动化任何项目。 Jenkins 2.441及之前版本、LTS 2.426.2及之前版本存在安全漏洞,该漏洞源于允许未经身份验证的攻击者读取Jenkins控制器文件系统。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Jenkins ProjectJenkins 0 ~ 1.606 -

II. Public POCs for CVE-2024-23897

#POC DescriptionSource LinkShenlong Link
1Workaround for disabling the CLI to mitigate SECURITY-3314/CVE-2024-23897 and SECURITY-3315/CVE-2024-23898https://github.com/jenkinsci-cert/SECURITY-3314-3315POC Details
2CVE-2024-23897 (CVSS 9.8): Critical Jenkins Security Vulnerability, RCE POC https://github.com/forsaken0127/CVE-2024-23897POC Details
3Nonehttps://github.com/binganao/CVE-2024-23897POC Details
4CVE-2024-23897https://github.com/h4x0r-dz/CVE-2024-23897POC Details
5CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. https://github.com/xaitax/CVE-2024-23897POC Details
6Nonehttps://github.com/vmtyan/poc-cve-2024-23897POC Details
7Scanner for CVE-2024-23897 - Jenkinshttps://github.com/yoryio/CVE-2024-23897POC Details
8CVE-2024-23897 jenkins-clihttps://github.com/CKevens/CVE-2024-23897POC Details
9on this git you can find all information on the CVE-2024-23897https://github.com/iota4/PoC-jenkins-rce_CVE-2024-23897POC Details
10CVE-2024-23897 - Jenkins 任意文件读取 利用工具https://github.com/wjlin0/CVE-2024-23897POC Details
11This repository presents a proof-of-concept of CVE-2024-23897https://github.com/Vozec/CVE-2024-23897POC Details
12Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.https://github.com/raheel0x01/CVE-2024-23897POC Details
13Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCEhttps://github.com/viszsec/CVE-2024-23897POC Details
14Nonehttps://github.com/jopraveen/CVE-2024-23897POC Details
15PoC for CVE-2024-23897https://github.com/AbraXa5/Jenkins-CVE-2024-23897POC Details
16on this git you can find all information on the CVE-2024-23897https://github.com/iota4/PoC-Fix-jenkins-rce_CVE-2024-23897POC Details
17CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCEhttps://github.com/brijne/CVE-2024-23897-RCEPOC Details
18Nonehttps://github.com/WLXQqwer/Jenkins-CVE-2024-23897-POC Details
19Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)https://github.com/kaanatmacaa/CVE-2024-23897POC Details
20Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.https://github.com/Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-VulnerabilityPOC Details
21on this git you can find all information on the CVE-2024-23897https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897POC Details
22CVE-2024-23897https://github.com/B4CK4TT4CK/CVE-2024-23897POC Details
23Nonehttps://github.com/abdomagdy0/CVE-2024-23897-htbPOC Details
24POC for CVE-2024-23897 Jenkins File-Read https://github.com/godylockz/CVE-2024-23897POC Details
25Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897]https://github.com/ifconfig-me/CVE-2024-23897POC Details
26Perform with massive Jenkins Reading-2-RCEhttps://github.com/ThatNotEasy/CVE-2024-23897POC Details
27Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897 https://github.com/pulentoski/CVE-2024-23897-Arbitrary-file-readPOC Details
28Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins.https://github.com/Nebian/CVE-2024-23897POC Details
29This is an exploit script for CVE-2024-23897, a vulnerability affecting certain systems. The script is intended for educational and testing purposes only. Ensure that you have the necessary permissions before using it.https://github.com/Abo5/CVE-2024-23897POC Details
30Nonehttps://github.com/TheRedDevil1/CVE-2024-23897POC Details
31Jenkins CVE-2024-23897: Arbitrary File Read Vulnerabilityhttps://github.com/Athulya666/CVE-2024-23897POC Details
32[CVE-2024-23897] Jenkins CI Authenticated Arbitrary File Read Through the CLI Leads to Remote Code Execution (RCE)https://github.com/murataydemir/CVE-2024-23897POC Details
33Nonehttps://github.com/mil4ne/CVE-2024-23897-Jenkins-4.441POC Details
34Poc para explotar la vulnerabilidad CVE-2024-23897 en versiones 2.441 y anteriores de Jenkins, mediante la cual podremos leer archivos internos del sistema sin estar autenticadoshttps://github.com/Maalfer/CVE-2024-23897POC Details
35Un exploit con el que puedes aprovecharte de la vulnerabilidad (CVE-2024-23897)https://github.com/Surko888/Surko-Exploit-Jenkins-CVE-2024-23897POC Details
36CVE-2024-23897 jenkins-clihttps://github.com/3yujw7njai/CVE-2024-23897POC Details
37Nonehttps://github.com/AnastasiaStill/CVE-2024-23897POC Details
38Reproduce CVE-2024–23897https://github.com/NoSpaceAvailable/CVE-2024-23897POC Details
39Jenkins CVE-2024-23897: Arbitrary File Read Vulnerabilityhttps://github.com/JAthulya/CVE-2024-23897POC Details
40exploit diseñado para aprovechar una vulnerabilidad crítica en Jenkins versiones <= 2.441. La vulnerabilidad, CVE-2024-23897, permite la lectura arbitraria de archivos a través del CLI de Jenkins, lo que puede llevar a la exposición de información sensible o incluso a la ejecución remota de código (RCE) bajo ciertas circunstancias.https://github.com/BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-FsocietyPOC Details
41CVE-2024-23897 분석https://github.com/ShieldAuth-PHP/PBL05-CVE-AnalsysPOC Details
42Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.https://github.com/r0xdeadbeef/CVE-2024-23897POC Details
43Nonehttps://github.com/fullaw4ke/CVE-2024-23897-Jenkins-4.441POC Details
44POC - Jenkins File Read Vulnerability - CVE-2024-23897https://github.com/verylazytech/CVE-2024-23897POC Details
45CVE-2024-23897 exploit scripthttps://github.com/cc3305/CVE-2024-23897POC Details
46CVE-2024-23897是一个影响Jenkins的严重安全漏洞https://github.com/zgimszhd61/CVE-2024-23897-pocPOC Details
47Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability Leading to RCEhttps://github.com/safeer-accuknox/Jenkins-Args4j-CVE-2024-23897-POCPOC Details
48Nonehttps://github.com/D1se0/CVE-2024-23897-Vulnerabilidad-JenkinsPOC Details
49Jenkins CVE-2024-23897 POC : Arbitrary File Read Vulnerability Leading to RCEhttps://github.com/Marouane133/jenkins-lfiPOC Details
50CVE-2024-23897 jenkins-clihttps://github.com/AiK1d/CVE-2024-23897POC Details
51Jenkins RCE Arbitrary File Read CVE-2024-23897 https://github.com/slytechroot/CVE-2024-23897POC Details
52Nonehttps://github.com/brandonhjh/Jenkins-CVE-2024-23897-Exploit-DemoPOC Details
53Jenkins CLI arbitrary read (CVE-2024-23897 applies to versions below 2.442 and LTS 2.426.3)https://github.com/tvasari/CVE-2024-23897POC Details
54Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system. https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2024/CVE-2024-23897.yamlPOC Details
55Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Jenkins%20CLI%20%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20CVE-2024-23897.mdPOC Details
56https://github.com/vulhub/vulhub/blob/master/jenkins/CVE-2024-23897/README.mdPOC Details
57Nonehttps://github.com/Fineken/Jenkins-CVE-2024-23897-LabPOC Details
58Nonehttps://github.com/revkami/CVE-2024-23897-Jenkins-4.441POC Details
59Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.https://github.com/r0xDB/CVE-2024-23897POC Details
60Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.https://github.com/R0XDEADBEEF/CVE-2024-23897POC Details
61CVE-2024-23897 jenkins-clihttps://github.com/P4x1s/CVE-2024-23897POC Details
62Jenkins CLI arbitrary file read (CVE-2024-23897)https://github.com/amalpvatayam67/day03-jenkins-23897POC Details
63Nonehttps://github.com/hybinn/CVE-2024-23897POC Details
64Nonehttps://github.com/aadi0258/Exploit-CVE-2024-23897POC Details
65Nonehttps://github.com/harekrishnarai/CVE-2024-23897-test-windowsPOC Details
66PoC para CVE-2024-23897 Jenkins Lectura de archivos internos del sistema.https://github.com/wvverez/CVE-2024-23897POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-23897

登录查看更多情报信息。

Same Patch Batch · Jenkins Project · 2024-01-24 · 9 CVEs total

CVE-2024-23905Jenkins Plugin Red Hat Dependency Analytics 安全漏洞
CVE-2024-23903Jenkins Plugin GitLab Branch Source 安全漏洞
CVE-2024-23904Jenkins Plugin Log Command 安全漏洞
CVE-2024-23902Jenkins Plugin GitLab Branch Source 安全漏洞
CVE-2024-23900Jenkins Plugin Matrix Project 安全漏洞
CVE-2024-23901Jenkins Plugin GitLab Branch Source 安全漏洞
CVE-2024-23899Jenkins Plugin Git server 安全漏洞
CVE-2024-23898Jenkins 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2024-23897

No comments yet


Leave a comment