CVE-2024-23897

Name
CVE-2024-23897
Description
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
jenkinsci-cert@googlegroups.com http://www.openwall.com/lists/oss-security/2024/01/24/6
vendor-advisory https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314
jenkinsci-cert@googlegroups.com http://packetstormsecurity.com/files/176839/Jenkins-2.441-LTS-2.426.3-CVE-2024-23897-Scanner.html
jenkinsci-cert@googlegroups.com http://packetstormsecurity.com/files/176840/Jenkins-2.441-LTS-2.426.3-Arbitrary-File-Read.html
jenkinsci-cert@googlegroups.com https://www.sonarsource.com/blog/excessive-expansion-uncovering-critical-security-vulnerabilities-in-jenkins/

Match rules

CPE URI Source package Min version Max version
jenkins >= 0 < 1.606
jenkins >= 2.442 < *
jenkins >= 2.426.3 < 2.426.*
jenkins >= 2.440.1 < 2.440.*

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
jenkins 3.19-community 2.440.3-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins 3.20-community 2.440.2-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable