支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: d7ae919b2536ff86c2a831440ecfa53d74258e86

来源
关联漏洞
标题:Jenkins 安全漏洞 (CVE-2024-43044)
Description:Jenkins是Jenkins开源的一个应用软件。一个开源自动化服务器Jenkins提供了数百个插件来支持构建,部署和自动化任何项目。 Jenkins 2.470及之前版本和Jenkins LTS 2.452.3及之前版本存在安全漏洞,该漏洞源于允许代理进程使用Remoting中的ClassLoaderProxy#fetchJar方法从Jenkins控制器文件系统读取任意文件。
介绍
# CVE-2024-43044

## Description
This script checks Jenkins instances for CVE-2024-43044 by retrieving the Jenkins version from the instance and comparing it against known vulnerable version ranges.

- **CVE-2024-43044**: This vulnerability affects Jenkins core and remoting versions, allowing attackers to exploit certain versions of Jenkins. Details about this CVE can be found [here](https://feedly.com/cve/CVE-2024-43044).
- **GHSA-h856-ffvv-xvr4**: This advisory covers another set of vulnerabilities in Jenkins versions, providing specific version ranges that are susceptible to attacks. More information is available on the [GitHub advisory page](https://github.com/advisories/GHSA-h856-ffvv-xvr4).

## Script Functionality

The script performs the following steps:
1. **Retrieve Jenkins Version**: It sends a request to the Jenkins URL and retrieves the Jenkins version from the response headers.
2. **Check Version Ranges**: It compares the retrieved version against predefined vulnerable version ranges.
3. **Output Results**: It prints whether the Jenkins instance is potentially vulnerable based on the version check.

## Usage

### Command Line

To check a list of Jenkins instance URLs provided as command-line arguments:
```sh
python CVE-2024-43044.py <url1> <url2> ...
```

To check Jenkins instance URLs from a file:
```sh
python CVE-2024-43044.py -f <file_with_urls>
```

## References

- [CVE-2024-43044](https://feedly.com/cve/CVE-2024-43044)
- [GitHub Security Advisory GHSA-h856-ffvv-xvr4](https://github.com/advisories/GHSA-h856-ffvv-xvr4)

Use this script to ensure your Jenkins instances are secure and up-to-date by regularly checking for vulnerabilities.
文件快照

[4.0K] /data/pocs/d7ae919b2536ff86c2a831440ecfa53d74258e86 ├── [2.5K] CVE-2024-43044.py └── [1.6K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。