Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-23897

Опубликовано: 24 янв. 2024
Источник: debian
EPSS Критический

Описание

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jenkinsremovedpackage

EPSS

Процентиль: 100%
0.94466
Критический

Связанные уязвимости

CVSS3: 9.8
redhat
больше 1 года назад

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

CVSS3: 9.8
nvd
больше 1 года назад

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

CVSS3: 9.8
github
больше 1 года назад

Arbitrary file read vulnerability through the Jenkins CLI can lead to RCE

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость библиотеки args4j встроенного интерфейса командной строки (CLI) сервера автоматизации Jenkins, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
redos
около 1 года назад

Множественные уязвимости jenkins

EPSS

Процентиль: 100%
0.94466
Критический