Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-43494 PoC — Jenkins 安全漏洞

Source
Associated Vulnerability
Title:Jenkins 安全漏洞 (CVE-2023-43494)
Description:Jenkins是Jenkins开源的一个应用软件。一个开源自动化服务器Jenkins提供了数百个插件来支持构建,部署和自动化任何项目。 Jenkins 存在安全漏洞,该漏洞源于不会从构建历史记录小部件的搜索中排除敏感构建变量(例如密码参数值),从而允许具有 Item/Read 权限的攻击者通过迭代测试不同的字符来获取构建中使用的敏感变量的值,直到发现正确的序列。
Description
Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) File Read
Readme
# CVE-2023-43494
Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) File Read

References:
https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3261

http://www.openwall.com/lists/oss-security/2023/09/20/5
File Snapshot

[4.0K] /data/pocs/db419c81c672eae66790ac329bc4156634a4c434 ├── [1.2K] exploit.py └── [ 253] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.