Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2024-23897

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.945
EPSS Ranking 100.0%
CVSS Severity
CVSS v3 Score 9.8
Proposed Action
Jenkins Command Line Interface (CLI) contains a path traversal vulnerability that allows attackers limited read access to certain files, which can lead to code execution.
Ransomware Campaign
Known
References
Products affected by CVE-2024-23897


Contact Us

Shodan ® - All rights reserved