Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
References
Configurations
Configuration 1 (hide)
|
History
24 Oct 2025, 14:49
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23897 - US Government Resource |
21 Oct 2025, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
20 Dec 2024, 17:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.vicarius.io/vsociety/posts/the-anatomy-of-a-jenkins-vulnerability-cve-2024-23897-revealed-1 - Exploit, Third Party Advisory |
Information
Published : 2024-01-24 18:15
Updated : 2025-10-24 14:49
NVD link : CVE-2024-23897
Mitre link : CVE-2024-23897
CVE.ORG link : CVE-2024-23897
JSON object : View
Products Affected
jenkins
- jenkins
