Skip to content

cc3305/CVE-2024-23897

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-23897

Because of a misconfiguration of a default option in the CLI command parser, a attacker can read arbitrary files

Summary of the CVE

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

Affected Versions

  • Jenkins < 2.442
  • Jenkins LTS Edition < 2.426.3

Anomalies

The Security Advisory states the following:

  • Attackers with Overall/Read permission can read the entire file
  • Attackers without Overall/Read permission can read the first few lines of a file, depending on available CLI commands

I have not been able to reproduce either of this, so the parsing of the output may be wrong in some cases. Use --raw if you feel like this is the case.

References

About

CVE-2024-23897 exploit script

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages