exploitdb
WORKING POC
by Matisse Beckandt · pythonwebappsjava
https://www.exploit-db.com/exploits/51993
This exploit leverages a local file inclusion vulnerability in Jenkins 2.441 by manipulating CLI commands to read arbitrary files from the server. It establishes a session to send crafted payloads and retrieve file contents.
Classification
Working Poc 95%
Target:
Jenkins 2.441
No auth needed
Prerequisites:
Network access to the Jenkins CLI endpoint
nomisec
WORKING POC
203 stars
by h4x0r-dz · infoleak
https://github.com/h4x0r-dz/CVE-2024-23897
This repository contains a functional exploit for CVE-2024-23897, an arbitrary file read vulnerability in Jenkins. The exploit leverages the args4j library's file expansion feature to read files from the Jenkins controller, potentially leading to RCE.
Classification
Working Poc 95%
Target:
Jenkins (versions 2.441 and earlier, LTS 2.426.2 and earlier)
Auth required
Prerequisites:
Overall/Read permission for full file read, or limited access for partial file read · Network access to the Jenkins CLI endpoint
nomisec
WORKING POC
99 stars
by binganao · infoleak
https://github.com/binganao/CVE-2024-23897
This repository contains a functional exploit PoC for CVE-2024-23897, which leverages a deserialization vulnerability in the target software. The exploit sends crafted binary data via HTTP POST requests to achieve arbitrary file read or command execution.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Unknown (likely a web application or service with a CLI endpoint)
No auth needed
Prerequisites:
Network access to the target service · Target service must be running and exposed
nomisec
WORKING POC
86 stars
by wjlin0 · infoleak
https://github.com/wjlin0/CVE-2024-23897
This repository contains a functional exploit tool for CVE-2024-23897, a Jenkins arbitrary file read vulnerability. The tool is written in Go and includes features for scanning, command execution, and proxy support.
Classification
Working Poc 95%
Target:
Jenkins
No auth needed
Prerequisites:
Access to a vulnerable Jenkins instance
nomisec
WORKING POC
80 stars
by xaitax · infoleak
https://github.com/xaitax/CVE-2024-23897
This repository contains a functional Python exploit for CVE-2024-23897, targeting Jenkins versions <= 2.441 and <= LTS 2.426.2. The exploit leverages a vulnerability in the Jenkins CLI endpoint to read arbitrary files from the target system, demonstrating an information leak attack.
Classification
Working Poc 95%
Target:
Jenkins <= 2.441 & <= LTS 2.426.2
No auth needed
Prerequisites:
Network access to the Jenkins CLI endpoint · Jenkins instance running a vulnerable version
nomisec
WORKING POC
38 stars
by godylockz · infoleak
https://github.com/godylockz/CVE-2024-23897
This repository contains a functional Python script that exploits CVE-2024-23897, an arbitrary file read vulnerability in Jenkins. The exploit leverages the CLI command parser's feature to replace an '@' character followed by a file path with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Classification
Working Poc 95%
Target:
Jenkins <= 2.441, LTS <= 2.426.2
No auth needed
Prerequisites:
Network access to the Jenkins server · Jenkins server running a vulnerable version
nomisec
SCANNER
21 stars
by kaanatmacaa · infoleak
https://github.com/kaanatmacaa/CVE-2024-23897
This repository contains a Nuclei template designed to detect the presence of CVE-2024-23897, a local file inclusion (LFI) vulnerability in Jenkins. The template sends a crafted payload to the Jenkins CLI endpoint and checks for vulnerable versions in the response.
Classification
Scanner 90%
Target:
Jenkins (versions 2.x up to 441)
No auth needed
Prerequisites:
Access to the Jenkins CLI endpoint
nomisec
WORKING POC
16 stars
by Vozec · infoleak
https://github.com/Vozec/CVE-2024-23897
The repository contains a functional Python exploit for CVE-2024-23897, which leverages Jenkins' CLI command parser to read arbitrary files on the server. The exploit uses threading to simultaneously upload a crafted payload and download the file contents via the Jenkins CLI endpoint.
Classification
Working Poc 95%
Target:
Jenkins (versions 2.441 and earlier, LTS 2.426.2 and earlier)
Auth required
Prerequisites:
Overall/Read permission for full file read, or no permission for partial read · Access to Jenkins CLI endpoint
nomisec
WORKING POC
15 stars
by P4x1s · poc
https://github.com/P4x1s/CVE-2024-23897
This repository demonstrates an exploit for CVE-2024-23897, a Jenkins CLI vulnerability allowing file leakage and RCE. The PoC uses `jenkins-cli.jar` to read arbitrary files (e.g., `/etc/passwd`) from a vulnerable Jenkins instance.
Classification
Working Poc 90%
Target:
Jenkins (versions allowing anonymous access or user registration)
No auth needed
Prerequisites:
Jenkins instance with anonymous access or user registration enabled · Network access to the Jenkins CLI port
nomisec
WORKING POC
11 stars
by Maalfer · infoleak
https://github.com/Maalfer/CVE-2024-23897
This repository contains a functional exploit for CVE-2024-23897, a local file inclusion vulnerability in Jenkins versions 2.441 and earlier. The exploit downloads the Jenkins CLI and uses it to read arbitrary files from the target system.
Classification
Working Poc 90%
Target:
Jenkins versions 2.441 and earlier
No auth needed
Prerequisites:
Network access to the Jenkins server · Jenkins CLI accessible at /jnlpJars/jenkins-cli.jar
nomisec
WORKING POC
10 stars
by verylazytech · infoleak
https://github.com/verylazytech/CVE-2024-23897
This repository contains a functional Python exploit for CVE-2024-23897, a Jenkins file read vulnerability. The exploit leverages the Jenkins CLI endpoint to read arbitrary files from the server by crafting specific requests with session UUIDs and payload structures.
Classification
Working Poc 95%
Target:
Jenkins versions up to 2.441 and Jenkins LTS versions up to 2.426.2
No auth needed
Prerequisites:
Network access to the Jenkins CLI endpoint · Jenkins server vulnerable to CVE-2024-23897
nomisec
SCANNER
5 stars
by yoryio · poc
https://github.com/yoryio/CVE-2024-23897
The repository contains a Python script that scans for Jenkins servers vulnerable to CVE-2024-23897 using Shodan. It checks the version of Jenkins by examining the 'X-Jenkins' header and compares it against known vulnerable versions.
Classification
Scanner 90%
Target:
Jenkins Server <= 2.441, LTS <= 2.426.3
No auth needed
Prerequisites:
Shodan API key · Internet access
nomisec
WORKING POC
5 stars
by viszsec · infoleak
https://github.com/viszsec/CVE-2024-23897
This repository contains a functional exploit for CVE-2024-23897, which leverages Jenkins' CLI command parser to read arbitrary files on the server. The exploit sends crafted HTTP requests to the Jenkins CLI endpoint to trigger the vulnerability and retrieve file contents.
Classification
Working Poc 95%
Target:
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier
Auth required
Prerequisites:
Network access to the Jenkins CLI endpoint · Overall/Read permission for full file access or limited access without permissions
nomisec
WORKING POC
4 stars
by 10T4 · poc
https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897
This repository provides a functional proof-of-concept for CVE-2024-23897, an arbitrary file read vulnerability in Jenkins via the CLI's expandAtFiles feature. It includes commands to exploit the vulnerability both with and without authentication, along with mitigation steps.
Classification
Working Poc 95%
Target:
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier
Auth required
Prerequisites:
Jenkins CLI client (jenkins-cli.jar) · Network access to Jenkins server
github
WORKING POC
3 stars
by Pocland-db · c++poc
https://github.com/Pocland-db/cve-pocs/tree/main/2024/CVE-2024-23897
This repository contains a functional exploit for CVE-2024-23897, which leverages Jenkins' arbitrary file leak vulnerability to read sensitive files. The PoC uses the Jenkins CLI to fetch files from the target system.
Classification
Working Poc 95%
Target:
Jenkins Version 4.441
No auth needed
Prerequisites:
Target Jenkins instance accessible · Jenkins CLI JAR file downloadable from the target
github
WORKING POC
3 stars
by Pocland-db · cpoc
https://github.com/Pocland-db/cve-pocs/tree/main/2024/ CVE-2024-23897
The repository contains a functional exploit for CVE-2024-23897, which leverages Jenkins CLI to perform arbitrary file reads. The exploit downloads the Jenkins CLI JAR and uses it to read specified files from the target system.
Classification
Working Poc 95%
Target:
Jenkins Version 4.441
No auth needed
Prerequisites:
Target Jenkins URL · File path to read
nomisec
SUSPICIOUS
3 stars
by D1se0 · infoleak
https://github.com/D1se0/CVE-2024-23897-Vulnerabilidad-Jenkins
The repository claims to exploit CVE-2024-23897 in Jenkins but lacks actual exploit code, instead directing users to download external files from Google Drive. The README is vague and focuses on setup instructions rather than technical details.
Classification
Suspicious 90%
Target:
Jenkins (versions prior to fix)
No auth needed
Prerequisites:
Network access to vulnerable Jenkins server · Python 3.x with requests library
nomisec
WORKING POC
3 stars
by mil4ne · infoleak
https://github.com/mil4ne/CVE-2024-23897-Jenkins-4.441
This repository contains a functional exploit for CVE-2024-23897, an arbitrary file leak vulnerability in Jenkins. The exploit uses the Jenkins CLI to read arbitrary files from the target system by leveraging the 'connect-node' command with a crafted file path.
Classification
Working Poc 90%
Target:
Jenkins Version 4.441
No auth needed
Prerequisites:
Access to the Jenkins web interface · Network connectivity to the target Jenkins server
nomisec
WORKING POC
3 stars
by ThatNotEasy · remote
https://github.com/ThatNotEasy/CVE-2024-23897
This repository contains a functional Python exploit for CVE-2024-23897, targeting Jenkins servers. The exploit leverages arbitrary file read and upload capabilities via crafted HTTP requests to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Jenkins
No auth needed
Prerequisites:
Python 3 · requests library · argparse library · colorama library · concurrent.futures library
nomisec
WORKING POC
3 stars
by Praison001 · infoleak
https://github.com/Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability
The repository contains a functional Python exploit for CVE-2024-23897, an arbitrary file read vulnerability in Jenkins. The exploit leverages the CLI command parser's '@' character replacement feature to read arbitrary files from the Jenkins controller file system.
Classification
Working Poc 95%
Target:
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier
No auth needed
Prerequisites:
Legacy mode authorization enabled · Anonymous read access allowed · Signup feature enabled
nomisec
WORKING POC
2 stars
by Fineken · infoleak
https://github.com/Fineken/Jenkins-CVE-2024-23897-Lab
This repository contains a functional exploit for CVE-2024-23897, an arbitrary file read vulnerability in Jenkins 2.441 and earlier. The exploit leverages the Jenkins CLI to read files via the 'help' and 'connect-node' commands, demonstrating both partial and full file disclosure.
Classification
Working Poc 95%
Target:
Jenkins 2.441 and earlier
No auth needed
Prerequisites:
Access to Jenkins CLI endpoint · Network connectivity to the target Jenkins instance
github
WORKING POC
2 stars
by Pr0t0c01 · pythonpoc
https://github.com/Pr0t0c01/CVEs/tree/main/Jenkins_CVE-2024-23897
The repository contains functional exploit code for CVE-2024-23897, including a Nuclei template and README with technical details. The exploit demonstrates the vulnerability by sending crafted HTTP requests to achieve remote code execution.
Classification
Working Poc 95%
Target:
Jenkins
No auth needed
Prerequisites:
Network access to the target Jenkins instance
nomisec
WORKING POC
2 stars
by vmtyan · infoleak
https://github.com/vmtyan/poc-cve-2024-23897
This repository contains a functional Go-based proof-of-concept exploit for CVE-2024-23897, targeting the args4j module to achieve remote code execution (RCE). The exploit sends a crafted payload via HTTP POST requests to a vulnerable endpoint, leveraging a session-based communication mechanism.
Classification
Working Poc 95%
Target:
args4j module (version not specified)
No auth needed
Prerequisites:
Network access to the vulnerable endpoint · Vulnerable version of args4j module
nomisec
WORKING POC
1 stars
by wvverez · infoleak
https://github.com/wvverez/CVE-2024-23897
This repository contains a functional exploit for CVE-2024-23897, which leverages Jenkins CLI's args4j library to read arbitrary files by exploiting the @ symbol file inclusion feature. The exploit downloads the Jenkins CLI JAR and uses it to read internal system files.
Classification
Working Poc 90%
Target:
Jenkins ≤ 2.441
No auth needed
Prerequisites:
Network access to Jenkins CLI endpoint · Jenkins CLI JAR downloadable from target
nomisec
WORKING POC
1 stars
by Marouane133 · infoleak
https://github.com/Marouane133/jenkins-lfi
This repository contains a functional Python PoC for CVE-2024-23897, a Jenkins arbitrary file read vulnerability that can lead to RCE. The exploit uses crafted CLI requests with session manipulation to read files from the target system.
Classification
Working Poc 95%
Target:
Jenkins
No auth needed
Prerequisites:
Network access to Jenkins CLI endpoint · Jenkins instance vulnerable to CVE-2024-23897
nomisec
WORKING POC
1 stars
by JAthulya · infoleak
https://github.com/JAthulya/CVE-2024-23897
This repository contains a functional Python exploit for CVE-2024-23897, an arbitrary file read vulnerability in Jenkins. The exploit uses a two-step request process with crafted headers and payloads to read files from the target system.
Classification
Working Poc 95%
Target:
Jenkins (version not specified)
No auth needed
Prerequisites:
Network access to the target Jenkins instance · Python environment with 'requests' library
nomisec
SCANNER
1 stars
by Nebian · infoleak
https://github.com/Nebian/CVE-2024-23897
The repository contains a Python script that enumerates directories or files in Jenkins by leveraging CVE-2024-23897. It downloads the Jenkins CLI JAR and uses it to test for the presence of files/directories via a wordlist.
Classification
Scanner 90%
Target:
Jenkins
No auth needed
Prerequisites:
Access to Jenkins server URL · Wordlist for directory/file enumeration
nomisec
WORKING POC
1 stars
by AbraXa5 · poc
https://github.com/AbraXa5/Jenkins-CVE-2024-23897
This repository contains a functional Python exploit for CVE-2024-23897, an arbitrary file read vulnerability in Jenkins' CLI. The PoC uses a crafted request to read files from the Jenkins controller file system by leveraging the CLI endpoint with a race condition between upload and download requests.
Classification
Working Poc 95%
Target:
Jenkins versions <= 2.441 and LTS versions <= 2.426.2
No auth needed
Prerequisites:
Network access to the Jenkins CLI endpoint · Jenkins instance with Overall/Read permission
nomisec
WORKING POC
1 stars
by jopraveen · infoleak
https://github.com/jopraveen/CVE-2024-23897
This exploit leverages CVE-2024-23897 to interact with Jenkins CLI commands, potentially enabling unauthorized command execution or information disclosure. The script automates the download of jenkins-cli.jar if not present and uses it to execute commands like 'who-am-i', 'enable-job', and 'help' with crafted arguments.
Classification
Working Poc 90%
Target:
Jenkins
No auth needed
Prerequisites:
Network access to Jenkins instance · Jenkins CLI port accessible · Python environment
nomisec
SCANNER
by w41l3r · poc
https://github.com/w41l3r/jenkins_scan
This repository contains a Python-based scanner for detecting Jenkins instances and checking for CVE-2024-23897, an unauthenticated arbitrary file read vulnerability via CLI argument injection. It includes both passive version checks and active CLI protocol handshake probes.
Classification
Scanner 95%
Target:
Jenkins < 2.442 (weekly) | Jenkins LTS < 2.426.3
No auth needed
Prerequisites:
Network access to Jenkins instance · Python 3 with requests library
nomisec
WORKING POC
by vmc8ll · poc
https://github.com/vmc8ll/poc-CVE-2024-23897
This repository contains a functional Go-based exploit for CVE-2024-23897, which leverages Jenkins' CLI command parser to read arbitrary files, potentially leading to RCE. The PoC constructs a binary payload with an '@' symbol to trigger file expansion and uses concurrent HTTP requests to exploit the vulnerability.
Classification
Working Poc 95%
Target:
Jenkins (2.441 and earlier, LTS 2.426.2 and earlier)
No auth needed
Prerequisites:
Network access to Jenkins CLI endpoint · Jenkins server with vulnerable version
gitlab
WORKING POC
by milo2012 · infoleak
https://gitlab.com/milo2012/cve-2024-23897
This repository contains a functional Python exploit for CVE-2024-23897, targeting Jenkins versions <= 2.441 and LTS <= 2.426.2. The exploit leverages the CLI command parsing vulnerability to read arbitrary files from the target system, with support for multi-threaded scanning and file-based input/output.
Classification
Working Poc 95%
Target:
Jenkins <= 2.441, Jenkins LTS <= 2.426.2
No auth needed
Prerequisites:
Network access to Jenkins CLI endpoint · Jenkins CLI endpoint enabled
nomisec
STUB
by harekrishnarai · poc
https://github.com/harekrishnarai/CVE-2024-23897-test-windows
The repository contains only a minimal README with no exploit code, technical details, or functional content related to CVE-2024-23897. It appears to be a placeholder or incomplete submission.
Target:
unknown
No auth needed
nomisec
WORKING POC
by aadi0258 · infoleak
https://github.com/aadi0258/Exploit-CVE-2024-23897
This repository contains a functional exploit for CVE-2024-23897, targeting Jenkins arbitrary file read vulnerability via CLI endpoint manipulation. The exploit uses a two-threaded approach to send crafted upload/download requests, demonstrating the vulnerability with clear technical implementation.
Classification
Working Poc 95%
Target:
Jenkins 2.441 (JDK 17)
No auth needed
Prerequisites:
Network access to Jenkins CLI endpoint · Jenkins instance running vulnerable version
nomisec
WORKING POC
by hybinn · infoleak
https://github.com/hybinn/CVE-2024-23897
This repository contains a functional Python exploit for CVE-2024-23897, targeting Jenkins versions < 2.442 and < LTS 2.426.3. The exploit includes version checking, vulnerability verification, and file reading capabilities via Jenkins CLI.
Classification
Working Poc 95%
Target:
Jenkins < 2.442, Jenkins LTS < 2.426.3
No auth needed
Prerequisites:
Network access to Jenkins instance · Jenkins CLI access
nomisec
WORKING POC
by amalpvatayam67 · infoleak
https://github.com/amalpvatayam67/day03-jenkins-23897
This repository contains a functional exploit for CVE-2024-23897, an arbitrary file read vulnerability in Jenkins CLI. The exploit leverages the `@/path` expansion feature to read local files and reflect their first lines via CLI help output.
Classification
Working Poc 95%
Target:
Jenkins ≤ 2.441 (LTS ≤ 2.426.2)
No auth needed
Prerequisites:
Access to Jenkins CLI endpoint · Jenkins version ≤ 2.441 or LTS ≤ 2.426.2
nomisec
STUB
by brandonhjh · poc
https://github.com/brandonhjh/Jenkins-CVE-2024-23897-Exploit-Demo
The repository contains only Python virtual environment activation scripts and no actual exploit code or technical details related to CVE-2024-23897. The files are part of a virtual environment setup and do not demonstrate or analyze the vulnerability.
Target:
Jenkins
No auth needed
nomisec
WORKING POC
by tvasari · remote
https://github.com/tvasari/CVE-2024-23897
This Python script exploits CVE-2024-23897 by leveraging Jenkins CLI commands to read arbitrary files on the target system. It uses proxychains for routing traffic and requires a valid jenkins-cli.jar file.
Classification
Working Poc 90%
Target:
Jenkins
Auth required
Prerequisites:
jenkins-cli.jar file · valid Jenkins server URI · file path with read permissions
nomisec
WORKING POC
by slytechroot · infoleak
https://github.com/slytechroot/CVE-2024-23897
This repository contains a functional exploit for CVE-2024-23897, a Jenkins RCE vulnerability via the args4j module. The PoC demonstrates arbitrary file read by sending crafted HTTP requests to the Jenkins CLI endpoint.
Classification
Working Poc 95%
Target:
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier
No auth needed
Prerequisites:
Network access to the Jenkins CLI endpoint · Jenkins instance with vulnerable args4j module enabled
nomisec
WORKING POC
by pulentoski · infoleak
https://github.com/pulentoski/CVE-2024-23897-Arbitrary-file-read
This repository contains functional Python scripts that exploit CVE-2024-23897, an arbitrary file read vulnerability in Jenkins. The scripts automate the process of downloading jenkins-cli.jar and executing commands to read sensitive files via the 'connect-node' command.
Classification
Working Poc 90%
Target:
Jenkins 2.441 and earlier, Jenkins LTS 2.426.2 and earlier
No auth needed
Prerequisites:
Access to the Jenkins server URL · Network connectivity to download jenkins-cli.jar
nomisec
WORKING POC
by cc3305 · infoleak
https://github.com/cc3305/CVE-2024-23897
This repository contains a functional Python exploit for CVE-2024-23897, targeting Jenkins. The exploit leverages a vulnerability in the CLI command handling to read arbitrary files from the server, with built-in version checking and session management.
Classification
Working Poc 95%
Target:
Jenkins (versions <= 2.426.2 LTS and <= 2.441)
No auth needed
Prerequisites:
Network access to the Jenkins server · Jenkins CLI endpoint accessible
nomisec
WORKING POC
by Surko888 · infoleak
https://github.com/Surko888/Surko-Exploit-Jenkins-CVE-2024-23897
This Python script exploits CVE-2024-23897 in Jenkins by downloading the jenkins-cli.jar file and executing a command to connect a malicious node. It leverages the vulnerability to achieve remote code execution (RCE) via the Jenkins CLI tool.
Classification
Working Poc 90%
Target:
Jenkins (version affected by CVE-2024-23897)
No auth needed
Prerequisites:
Network access to the Jenkins server · Jenkins server vulnerable to CVE-2024-23897
nomisec
WORKING POC
by classic130 · poc
https://github.com/classic130/CVE-2024-23897-Jenkins-4.441
This repository contains a functional exploit for CVE-2024-23897, an arbitrary file leak vulnerability in Jenkins. The exploit uses the Jenkins CLI to read arbitrary files from the target system by leveraging the 'connect-node' command.
Classification
Working Poc 95%
Target:
Jenkins Version 4.441
No auth needed
Prerequisites:
Target Jenkins instance accessible · Jenkins CLI JAR file downloadable from the target
nomisec
WRITEUP
by murataydemir · infoleak
https://github.com/murataydemir/CVE-2024-23897
This repository provides a detailed technical analysis of CVE-2024-23897, an arbitrary file read vulnerability in Jenkins CI due to the Args4j library's `expandAtFiles` feature. It includes exploitation steps, vulnerable code snippets, and patch analysis.
Classification
Writeup 95%
Target:
Jenkins CI (2.441 and earlier, LTS 2.426.2 and earlier)
Auth required
Prerequisites:
Authenticated access to Jenkins CLI · Overall/Read permission for full file read
nomisec
WORKING POC
by ifconfig-me · infoleak
https://github.com/ifconfig-me/CVE-2024-23897
This repository contains a functional exploit for CVE-2024-23897, a Jenkins arbitrary file read vulnerability. The PoC uses a multi-threaded approach to upload a crafted payload and download file contents via the Jenkins CLI endpoint.
Classification
Working Poc 95%
Target:
Jenkins
No auth needed
Prerequisites:
Access to Jenkins CLI endpoint · List of target URLs
nomisec
SUSPICIOUS
by B4CK4TT4CK · poc
https://github.com/B4CK4TT4CK/CVE-2024-23897
The repository contains no actual exploit code, only a README with generic instructions for using Jenkins CLI and a link to the CVE. It lacks technical details about the vulnerability or exploit mechanics.
Classification
Suspicious 90%
Target:
Jenkins
No auth needed
nomisec
WORKING POC
by WLXQqwer · infoleak
https://github.com/WLXQqwer/Jenkins-CVE-2024-23897-
This repository contains a functional exploit for CVE-2018-15473, an OpenSSH username enumeration vulnerability. The script uses malformed SSH packets to determine valid usernames on the target system.
Classification
Working Poc 95%
Target:
OpenSSH versions < 7.7
No auth needed
Prerequisites:
Network access to the target SSH service · Paramiko library installed
nomisec
WORKING POC
by r0xDB · poc
https://github.com/r0xDB/CVE-2024-23897
This repository contains a functional exploit for CVE-2024-23897, which leverages Jenkins' CLI command parser to read arbitrary files on the Jenkins controller file system. The exploit is written in C++ and uses Boost libraries to craft and send HTTP requests that trigger the vulnerability.
Classification
Working Poc 95%
Target:
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier
No auth needed
Prerequisites:
Network access to the Jenkins controller · Jenkins CLI endpoint accessible
vulncheck_xdb
WORKING POC
infoleak
https://github.com/chonoa323/WHS3
This repository contains a functional proof-of-concept exploit for CVE-2024-23897, demonstrating arbitrary file read in Jenkins via the args4j library's @file expansion feature. The PoC includes a Docker environment for testing and step-by-step commands to exploit the vulnerability.
Classification
Working Poc 95%
Target:
Jenkins < 2.441
No auth needed
Prerequisites:
Docker · jenkins-cli.jar · network access to Jenkins server
vulncheck_xdb
WORKING POC
infoleak
https://github.com/i-100-user/CVE-2024-25897
This repository contains a functional exploit for CVE-2024-23897, targeting Jenkins servers. The script downloads the jenkins-cli.jar file and executes a payload to connect a node, demonstrating the vulnerability.
Classification
Working Poc 90%
Target:
Jenkins
No auth needed
Prerequisites:
Access to the Jenkins server · Network connectivity to the target
vulncheck_xdb
WORKING POC
infoleak
https://github.com/dhsgud/jenkins
This repository provides a functional exploit for CVE-2024-23897, an arbitrary file read vulnerability in Jenkins. The exploit leverages the args4j library's file expansion feature to read sensitive files like /proc/self/environ, secret.key, and /etc/passwd via the Jenkins CLI.
Classification
Working Poc 95%
Target:
Jenkins versions up to 2.441
No auth needed
Prerequisites:
Jenkins CLI access · jenkins-cli.jar file
vulncheck_xdb
WORKING POC
remote
https://github.com/quentin33980/ToolBox-qgt
The repository contains a functional exploit for CVE-2024-23897, targeting Jenkins to leak the admin password via a verbose error message. It includes scripts to install Jenkins in a Docker container and exploit the vulnerability using the Jenkins CLI.
Classification
Working Poc 90%
Target:
Jenkins 2.440-jdk17
No auth needed
Prerequisites:
Docker installed · Jenkins running on localhost:8080
metasploit
WORKING POC
by h00die, Yaniv Nizry, binganao, h4x0r-dz, Vozec · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/jenkins_cli_ampersand_arbitrary_file_read.rb
This Metasploit module exploits CVE-2024-23897 in Jenkins by leveraging the CLI protocol's `help` command to read arbitrary files via the `@<filename>` expansion feature in `args4j`. It uses a timing-based approach with threaded requests to retrieve the first two lines of a target file.
Classification
Working Poc 100%
Target:
Jenkins versions <= 2.426.2 (LTS) and 2.427-2.441 (non-LTS)
No auth needed
Prerequisites:
Network access to Jenkins CLI endpoint (typically port 8080) · Read-only permissions (default for CLI)