支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:640

64.0%
一、 漏洞 CVE-2024-23897 基础信息
漏洞信息
                                        # N/A

## 漏洞概述
Jenkins 2.441 及更早版本和 LTS 2.426.2 及更早版本中的 CLI 命令解析器未禁用一个特性,该特性会用文件内容替换命令参数中的 '@' 符号后面跟随的文件路径,这允许未经身份验证的攻击者读取 Jenkins 控制器文件系统上的任意文件。

## 影响版本
- Jenkins 2.441 及更早版本
- LTS 2.426.2 及更早版本

## 漏洞细节
漏洞源于 CLI 命令解析器中未禁用的一个特性,该特性会将命令参数中以 '@' 符号开头并跟随文件路径的内容替换为该文件的实际内容。攻击者可以利用这一点,插入恶意参数导致解析器读取并泄露任意文件。

## 影响
- 允许未经身份验证的远程攻击者读取 Jenkins 控制器文件系统上的任意文件。
- 可能导致敏感信息泄露。
                                        
神龙判断

是否为 Web 类漏洞:

判断理由:

是。这个漏洞存在于Jenkins的CLI命令解析器中,它会将参数中'@'字符后面跟随的文件路径替换为该文件的内容。这一特性如果没有被禁用,将允许未认证的攻击者读取Jenkins控制器文件系统上的任意文件,这显然属于服务端的安全漏洞。
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
N/A
来源:美国国家漏洞数据库 NVD
漏洞描述信息
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
漏洞标题
Jenkins 安全漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Jenkins是Jenkins开源的一个应用软件。一个开源自动化服务器Jenkins提供了数百个插件来支持构建,部署和自动化任何项目。 Jenkins 2.441及之前版本、LTS 2.426.2及之前版本存在安全漏洞,该漏洞源于允许未经身份验证的攻击者读取Jenkins控制器文件系统。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
其他
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2024-23897 的公开POC
#POC 描述源链接神龙链接
1Workaround for disabling the CLI to mitigate SECURITY-3314/CVE-2024-23897 and SECURITY-3315/CVE-2024-23898https://github.com/jenkinsci-cert/SECURITY-3314-3315POC详情
2CVE-2024-23897 (CVSS 9.8): Critical Jenkins Security Vulnerability, RCE POC https://github.com/forsaken0127/CVE-2024-23897POC详情
3Nonehttps://github.com/binganao/CVE-2024-23897POC详情
4CVE-2024-23897https://github.com/h4x0r-dz/CVE-2024-23897POC详情
5CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. https://github.com/xaitax/CVE-2024-23897POC详情
6Nonehttps://github.com/vmtyan/poc-cve-2024-23897POC详情
7Scanner for CVE-2024-23897 - Jenkinshttps://github.com/yoryio/CVE-2024-23897POC详情
8CVE-2024-23897 jenkins-clihttps://github.com/CKevens/CVE-2024-23897POC详情
9on this git you can find all information on the CVE-2024-23897https://github.com/iota4/PoC-jenkins-rce_CVE-2024-23897POC详情
10CVE-2024-23897 - Jenkins 任意文件读取 利用工具https://github.com/wjlin0/CVE-2024-23897POC详情
11This repository presents a proof-of-concept of CVE-2024-23897https://github.com/Vozec/CVE-2024-23897POC详情
12Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.https://github.com/raheel0x01/CVE-2024-23897POC详情
13Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCEhttps://github.com/viszsec/CVE-2024-23897POC详情
14Nonehttps://github.com/jopraveen/CVE-2024-23897POC详情
15PoC for CVE-2024-23897https://github.com/AbraXa5/Jenkins-CVE-2024-23897POC详情
16on this git you can find all information on the CVE-2024-23897https://github.com/iota4/PoC-Fix-jenkins-rce_CVE-2024-23897POC详情
17CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCEhttps://github.com/brijne/CVE-2024-23897-RCEPOC详情
18Nonehttps://github.com/WLXQqwer/Jenkins-CVE-2024-23897-POC详情
19Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)https://github.com/kaanatmacaa/CVE-2024-23897POC详情
20Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.https://github.com/Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-VulnerabilityPOC详情
21on this git you can find all information on the CVE-2024-23897https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897POC详情
22CVE-2024-23897https://github.com/B4CK4TT4CK/CVE-2024-23897POC详情
23Nonehttps://github.com/abdomagdy0/CVE-2024-23897-htbPOC详情
24POC for CVE-2024-23897 Jenkins File-Read https://github.com/godylockz/CVE-2024-23897POC详情
25Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897]https://github.com/ifconfig-me/CVE-2024-23897POC详情
26Perform with massive Jenkins Reading-2-RCEhttps://github.com/ThatNotEasy/CVE-2024-23897POC详情
27Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897 https://github.com/pulentoski/CVE-2024-23897-Arbitrary-file-readPOC详情
28Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins.https://github.com/Nebian/CVE-2024-23897POC详情
29This is an exploit script for CVE-2024-23897, a vulnerability affecting certain systems. The script is intended for educational and testing purposes only. Ensure that you have the necessary permissions before using it.https://github.com/Abo5/CVE-2024-23897POC详情
30Nonehttps://github.com/TheRedDevil1/CVE-2024-23897POC详情
31Jenkins CVE-2024-23897: Arbitrary File Read Vulnerabilityhttps://github.com/Athulya666/CVE-2024-23897POC详情
32[CVE-2024-23897] Jenkins CI Authenticated Arbitrary File Read Through the CLI Leads to Remote Code Execution (RCE)https://github.com/murataydemir/CVE-2024-23897POC详情
33Nonehttps://github.com/mil4ne/CVE-2024-23897-Jenkins-4.441POC详情
34Poc para explotar la vulnerabilidad CVE-2024-23897 en versiones 2.441 y anteriores de Jenkins, mediante la cual podremos leer archivos internos del sistema sin estar autenticadoshttps://github.com/Maalfer/CVE-2024-23897POC详情
35Un exploit con el que puedes aprovecharte de la vulnerabilidad (CVE-2024-23897)https://github.com/Surko888/Surko-Exploit-Jenkins-CVE-2024-23897POC详情
36CVE-2024-23897 jenkins-clihttps://github.com/3yujw7njai/CVE-2024-23897POC详情
37Nonehttps://github.com/AnastasiaStill/CVE-2024-23897POC详情
38Reproduce CVE-2024–23897https://github.com/NoSpaceAvailable/CVE-2024-23897POC详情
39Jenkins CVE-2024-23897: Arbitrary File Read Vulnerabilityhttps://github.com/JAthulya/CVE-2024-23897POC详情
40exploit diseñado para aprovechar una vulnerabilidad crítica en Jenkins versiones <= 2.441. La vulnerabilidad, CVE-2024-23897, permite la lectura arbitraria de archivos a través del CLI de Jenkins, lo que puede llevar a la exposición de información sensible o incluso a la ejecución remota de código (RCE) bajo ciertas circunstancias.https://github.com/BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-FsocietyPOC详情
41CVE-2024-23897 분석https://github.com/ShieldAuth-PHP/PBL05-CVE-AnalsysPOC详情
42Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.https://github.com/r0xdeadbeef/CVE-2024-23897POC详情
43Nonehttps://github.com/fullaw4ke/CVE-2024-23897-Jenkins-4.441POC详情
44POC - Jenkins File Read Vulnerability - CVE-2024-23897https://github.com/verylazytech/CVE-2024-23897POC详情
45CVE-2024-23897 exploit scripthttps://github.com/cc3305/CVE-2024-23897POC详情
46CVE-2024-23897是一个影响Jenkins的严重安全漏洞https://github.com/zgimszhd61/CVE-2024-23897-pocPOC详情
47Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability Leading to RCEhttps://github.com/safeer-accuknox/Jenkins-Args4j-CVE-2024-23897-POCPOC详情
48Nonehttps://github.com/D1se0/CVE-2024-23897-Vulnerabilidad-JenkinsPOC详情
49Jenkins CVE-2024-23897 POC : Arbitrary File Read Vulnerability Leading to RCEhttps://github.com/Marouane133/jenkins-lfiPOC详情
50CVE-2024-23897 jenkins-clihttps://github.com/AiK1d/CVE-2024-23897POC详情
51Jenkins RCE Arbitrary File Read CVE-2024-23897 https://github.com/slytechroot/CVE-2024-23897POC详情
52Nonehttps://github.com/brandonhjh/Jenkins-CVE-2024-23897-Exploit-DemoPOC详情
53Jenkins CLI arbitrary read (CVE-2024-23897 applies to versions below 2.442 and LTS 2.426.3)https://github.com/tvasari/CVE-2024-23897POC详情
54Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system. https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2024/CVE-2024-23897.yamlPOC详情
55Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Jenkins%20CLI%20%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20CVE-2024-23897.mdPOC详情
56https://github.com/vulhub/vulhub/blob/master/jenkins/CVE-2024-23897/README.mdPOC详情
57Nonehttps://github.com/Fineken/Jenkins-CVE-2024-23897-LabPOC详情
58Nonehttps://github.com/revkami/CVE-2024-23897-Jenkins-4.441POC详情
59Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.https://github.com/r0xDB/CVE-2024-23897POC详情
60Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.https://github.com/R0XDEADBEEF/CVE-2024-23897POC详情
61CVE-2024-23897 jenkins-clihttps://github.com/P4x1s/CVE-2024-23897POC详情
62Jenkins CLI arbitrary file read (CVE-2024-23897)https://github.com/amalpvatayam67/day03-jenkins-23897POC详情
63Nonehttps://github.com/hybinn/CVE-2024-23897POC详情
64Nonehttps://github.com/aadi0258/Exploit-CVE-2024-23897POC详情
65Nonehttps://github.com/harekrishnarai/CVE-2024-23897-test-windowsPOC详情
三、漏洞 CVE-2024-23897 的情报信息
四、漏洞 CVE-2024-23897 的评论

暂无评论


发表评论