CVE-2024-23897Exploit Available
Jenkins Arbitrary File Read via CLI Parser
🏭 JenkinsCWE-88#File Read#CI/CD#Unauthenticated#Secrets Exposure
7.5High
010.0
Vulnerability Description
An unauthenticated attacker can read arbitrary files from the Jenkins controller file system, including secrets, credentials, and SSH keys, due to a vulnerability in the CLI command parser that incorrectly expands file paths.
Recommended Mitigation
Update Jenkins to 2.442 or LTS 2.426.3. As a workaround, disable the Jenkins CLI or set -Dorg.kohsuke.args4j.noOptionAsFileNameIfOptionDefinitionStartsWith=@ system property.
Affected Products
Jenkins LTS
Jenkins Weekly
Version constraint: Jenkins weekly < 2.442, LTS < 2.426.3
Quick Facts
- Published
- 2024-01-24
- Last Modified
- 2024-01-30
- Vendor
- Jenkins
- CWE
- CWE-88
- Exploit
- ⚠️ Public Exploit Exists
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N