PT-2023-8445 · Jenkins +1 · Jenkins +1

Alchemist

·

Published

2023-01-24

·

Updated

2025-11-25

·

CVE-2024-23897

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions: Jenkins versions 2.441 and earlier, LTS 2.426.2 and earlier.
Description:
Jenkins is vulnerable to an arbitrary file read vulnerability through its Command Line Interface (CLI). This flaw allows unauthenticated attackers to read arbitrary files on the Jenkins controller file system. The vulnerability stems from a failure to disable a feature in the CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents. This vulnerability has been actively exploited in the wild, with reports of ransomware attacks leveraging it. Proof-of-concept (PoC) exploits are publicly available. The vulnerability has a CVSS score of 9.8 and is considered critical. Several reports indicate that over 45,000 Jenkins instances are exposed and vulnerable. CISA has added this vulnerability to its Known Exploited Vulnerabilities catalog.
Recommendations:
At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

RCE

Information Disclosure

Improper Access Control

Path traversal

Weakness Enumeration

Related Identifiers

BDU:2024-00750
BIT-JENKINS-2024-23897
CVE-2024-23897
GHSA-6F9G-CXWR-Q5JR
RHSA-2024:0775
RHSA-2024:0776
RHSA-2024:0778

Affected Products

Jenkins
Red Os