Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
References
Configurations
Configuration 1 (hide)
|
History
20 Dec 2024, 17:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vicarius.io/vsociety/posts/the-anatomy-of-a-jenkins-vulnerability-cve-2024-23897-revealed-1 - Exploit, Third Party Advisory |
Information
Published : 2024-01-24 18:15
Updated : 2024-12-20 17:30
NVD link : CVE-2024-23897
Mitre link : CVE-2024-23897
CVE.ORG link : CVE-2024-23897
JSON object : View
Products Affected
jenkins
- jenkins