PT-2023-8445 · Jenkins +1 · Jenkins +1
Alchemist
·
Published
2023-01-24
·
Updated
2025-10-18
·
CVE-2024-23897
CVSS v3.1
9.8
9.8
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Jenkins versions prior to 2.442
Jenkins LTS versions prior to 2.426.3
Description
A critical vulnerability in Jenkins' built-in command line interface (CLI) allows unauthenticated attackers to read arbitrary files on the Jenkins controller file system. This vulnerability arises because Jenkins does not disable a feature in its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents. Attackers with Overall/Read permission can read entire files, while attackers without Overall/Read permission can read the first few lines of files. The number of lines that can be read depends on available CLI commands. Binary files containing cryptographic keys used for various Jenkins features can also be read, with some limitations. This vulnerability has been exploited in ransomware attacks and has a high CVSS score of 9.8.
Recommendations
To resolve the issue, update Jenkins to version 2.442 or later, or update Jenkins LTS to version 2.426.3 or later. If updating is not possible, consider disabling access to the CLI to prevent exploitation. Additionally, restrict access to the vulnerable module
args4j
to minimize the risk of exploitation. Avoid using the @
character followed by a file path in CLI commands until the issue is resolved.Exploit
Fix
RCE
Information Disclosure
Path traversal
Improper Access Control
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2024-00750
BIT-JENKINS-2024-23897
CVE-2024-23897
GHSA-6F9G-CXWR-Q5JR
RHSA-2024:0775
RHSA-2024:0776
RHSA-2024:0778
Affected Products
Jenkins
Red Os
References · 426
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/jenkins_cli_ampersand_arbitrary_file_read.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/h4x0r-dz/CVE-2024-23897⭐ 194 🔗 36 · Exploit
- 🔥 https://github.com/binganao/CVE-2024-23897⭐ 100 🔗 10 · Exploit
- 🔥 https://github.com/binganao/CVE-2024-23897/blob/main/poc.py⭐ 99 🔗 10 · Exploit
- 🔥 https://github.com/xaitax/CVE-2024-23897⭐ 70 🔗 22 · Exploit
- 🔥 https://github.com/wjlin0/CVE-2024-23897⭐ 72 🔗 12 · Exploit
- 🔥 https://github.com/kaanatmacaa/CVE-2024-23897⭐ 19 🔗 4 · Exploit
- 🔥 https://github.com/godylockz/CVE-2024-23897⭐ 17 🔗 2 · Exploit
- 🔥 https://github.com/3yujw7njai/CVE-2024-23897⭐ 14 🔗 2 · Exploit
- 🔥 https://github.com/Vozec/CVE-2024-23897⭐ 14 🔗 2 · Exploit
- 🔥 https://github.com/CKevens/CVE-2024-23897⭐ 14 🔗 2 · Exploit
- 🔥 https://github.com/Maalfer/CVE-2024-23897⭐ 7 🔗 3 · Exploit
- 🔥 https://github.com/jenkinsci-cert/SECURITY-3314-3315⭐ 7 🔗 2 · Exploit
- 🔥 https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897⭐ 6 🔗 2 · Exploit
- 🔥 https://github.com/verylazytech/CVE-2024-23897⭐ 7 🔗 1 · Exploit