关联漏洞
标题:Jenkins 安全漏洞 (CVE-2024-43044)Description:Jenkins是Jenkins开源的一个应用软件。一个开源自动化服务器Jenkins提供了数百个插件来支持构建,部署和自动化任何项目。 Jenkins 2.470及之前版本和Jenkins LTS 2.452.3及之前版本存在安全漏洞,该漏洞源于允许代理进程使用Remoting中的ClassLoaderProxy#fetchJar方法从Jenkins控制器文件系统读取任意文件。
介绍
# CVE-2024-43044
## Description
This script checks Jenkins instances for CVE-2024-43044 by retrieving the Jenkins version from the instance and comparing it against known vulnerable version ranges.
- **CVE-2024-43044**: This vulnerability affects Jenkins core and remoting versions, allowing attackers to exploit certain versions of Jenkins. Details about this CVE can be found [here](https://feedly.com/cve/CVE-2024-43044).
- **GHSA-h856-ffvv-xvr4**: This advisory covers another set of vulnerabilities in Jenkins versions, providing specific version ranges that are susceptible to attacks. More information is available on the [GitHub advisory page](https://github.com/advisories/GHSA-h856-ffvv-xvr4).
## Script Functionality
The script performs the following steps:
1. **Retrieve Jenkins Version**: It sends a request to the Jenkins URL and retrieves the Jenkins version from the response headers.
2. **Check Version Ranges**: It compares the retrieved version against predefined vulnerable version ranges.
3. **Output Results**: It prints whether the Jenkins instance is potentially vulnerable based on the version check.
## Usage
### Command Line
To check a list of Jenkins instance URLs provided as command-line arguments:
```sh
python CVE-2024-43044.py <url1> <url2> ...
```
To check Jenkins instance URLs from a file:
```sh
python CVE-2024-43044.py -f <file_with_urls>
```
## References
- [CVE-2024-43044](https://feedly.com/cve/CVE-2024-43044)
- [GitHub Security Advisory GHSA-h856-ffvv-xvr4](https://github.com/advisories/GHSA-h856-ffvv-xvr4)
Use this script to ensure your Jenkins instances are secure and up-to-date by regularly checking for vulnerabilities.
文件快照
[4.0K] /data/pocs/d7ae919b2536ff86c2a831440ecfa53d74258e86
├── [2.5K] CVE-2024-43044.py
└── [1.6K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。