CVE-2024-23897

CRITICAL KEV RANSOMWARE NUCLEI LAB

Jenkins cli Ampersand Replacement Arbitrary File Read

Title source: metasploit

Description

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

Exploits (56)

exploitdb WORKING POC
by Matisse Beckandt · pythonwebappsjava
https://www.exploit-db.com/exploits/51993
nomisec WORKING POC 203 stars
by h4x0r-dz · infoleak
https://github.com/h4x0r-dz/CVE-2024-23897
nomisec WORKING POC 99 stars
by binganao · infoleak
https://github.com/binganao/CVE-2024-23897
nomisec WORKING POC 86 stars
by wjlin0 · infoleak
https://github.com/wjlin0/CVE-2024-23897
nomisec WORKING POC 80 stars
by xaitax · infoleak
https://github.com/xaitax/CVE-2024-23897
nomisec WORKING POC 38 stars
by godylockz · infoleak
https://github.com/godylockz/CVE-2024-23897
nomisec SCANNER 21 stars
by kaanatmacaa · infoleak
https://github.com/kaanatmacaa/CVE-2024-23897
nomisec WORKING POC 16 stars
by Vozec · infoleak
https://github.com/Vozec/CVE-2024-23897
nomisec WORKING POC 15 stars
by P4x1s · poc
https://github.com/P4x1s/CVE-2024-23897
nomisec WORKING POC 11 stars
by Maalfer · infoleak
https://github.com/Maalfer/CVE-2024-23897
nomisec WORKING POC 10 stars
by verylazytech · infoleak
https://github.com/verylazytech/CVE-2024-23897
nomisec NO CODE 7 stars
by jenkinsci-cert · poc
https://github.com/jenkinsci-cert/SECURITY-3314-3315
nomisec SCANNER 5 stars
by yoryio · poc
https://github.com/yoryio/CVE-2024-23897
nomisec WORKING POC 5 stars
by viszsec · infoleak
https://github.com/viszsec/CVE-2024-23897
nomisec WORKING POC 4 stars
by 10T4 · poc
https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897
github WORKING POC 3 stars
by Pocland-db · c++poc
https://github.com/Pocland-db/cve-pocs/tree/main/2024/CVE-2024-23897
github WORKING POC 3 stars
by Pocland-db · cpoc
https://github.com/Pocland-db/cve-pocs/tree/main/2024/ CVE-2024-23897
nomisec SUSPICIOUS 3 stars
by D1se0 · infoleak
https://github.com/D1se0/CVE-2024-23897-Vulnerabilidad-Jenkins
nomisec WORKING POC 3 stars
by mil4ne · infoleak
https://github.com/mil4ne/CVE-2024-23897-Jenkins-4.441
nomisec WORKING POC 3 stars
by ThatNotEasy · remote
https://github.com/ThatNotEasy/CVE-2024-23897
nomisec WORKING POC 3 stars
by Praison001 · infoleak
https://github.com/Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability
nomisec WORKING POC 2 stars
by Fineken · infoleak
https://github.com/Fineken/Jenkins-CVE-2024-23897-Lab
github WORKING POC 2 stars
by Pr0t0c01 · pythonpoc
https://github.com/Pr0t0c01/CVEs/tree/main/Jenkins_CVE-2024-23897
nomisec WORKING POC 2 stars
by vmtyan · infoleak
https://github.com/vmtyan/poc-cve-2024-23897
nomisec WORKING POC 1 stars
by wvverez · infoleak
https://github.com/wvverez/CVE-2024-23897
nomisec WORKING POC 1 stars
by Marouane133 · infoleak
https://github.com/Marouane133/jenkins-lfi
nomisec WORKING POC 1 stars
by JAthulya · infoleak
https://github.com/JAthulya/CVE-2024-23897
nomisec SCANNER 1 stars
by Nebian · infoleak
https://github.com/Nebian/CVE-2024-23897
nomisec WORKING POC 1 stars
by AbraXa5 · poc
https://github.com/AbraXa5/Jenkins-CVE-2024-23897
nomisec WORKING POC 1 stars
by jopraveen · infoleak
https://github.com/jopraveen/CVE-2024-23897
nomisec SCANNER
by w41l3r · poc
https://github.com/w41l3r/jenkins_scan
nomisec WORKING POC
by vmc8ll · poc
https://github.com/vmc8ll/poc-CVE-2024-23897
gitlab WORKING POC
by milo2012 · infoleak
https://gitlab.com/milo2012/cve-2024-23897
nomisec STUB
by harekrishnarai · poc
https://github.com/harekrishnarai/CVE-2024-23897-test-windows
nomisec WORKING POC
by aadi0258 · infoleak
https://github.com/aadi0258/Exploit-CVE-2024-23897
nomisec WORKING POC
by hybinn · infoleak
https://github.com/hybinn/CVE-2024-23897
nomisec WORKING POC
by amalpvatayam67 · infoleak
https://github.com/amalpvatayam67/day03-jenkins-23897
nomisec STUB
by brandonhjh · poc
https://github.com/brandonhjh/Jenkins-CVE-2024-23897-Exploit-Demo
nomisec WORKING POC
by tvasari · remote
https://github.com/tvasari/CVE-2024-23897
nomisec WORKING POC
by slytechroot · infoleak
https://github.com/slytechroot/CVE-2024-23897
nomisec WORKING POC
by pulentoski · infoleak
https://github.com/pulentoski/CVE-2024-23897-Arbitrary-file-read
nomisec WORKING POC
by cc3305 · infoleak
https://github.com/cc3305/CVE-2024-23897
nomisec WORKING POC
by Surko888 · infoleak
https://github.com/Surko888/Surko-Exploit-Jenkins-CVE-2024-23897
nomisec WORKING POC
by classic130 · poc
https://github.com/classic130/CVE-2024-23897-Jenkins-4.441
nomisec WRITEUP
by murataydemir · infoleak
https://github.com/murataydemir/CVE-2024-23897
nomisec WORKING POC
by ifconfig-me · infoleak
https://github.com/ifconfig-me/CVE-2024-23897
nomisec SUSPICIOUS
by B4CK4TT4CK · poc
https://github.com/B4CK4TT4CK/CVE-2024-23897
nomisec WORKING POC
by WLXQqwer · infoleak
https://github.com/WLXQqwer/Jenkins-CVE-2024-23897-
nomisec WORKING POC
by r0xDB · poc
https://github.com/r0xDB/CVE-2024-23897
vulncheck_xdb WORKING POC
infoleak
https://github.com/chonoa323/WHS3
vulncheck_xdb WORKING POC
infoleak
https://github.com/i-100-user/CVE-2024-25897
vulncheck_xdb WORKING POC
infoleak
https://github.com/dhsgud/jenkins
vulncheck_xdb WORKING POC
remote
https://github.com/quentin33980/ToolBox-qgt
metasploit WORKING POC
by h00die, Yaniv Nizry, binganao, h4x0r-dz, Vozec · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/jenkins_cli_ampersand_arbitrary_file_read.rb

Nuclei Templates (1)

Jenkins < 2.441 - Arbitrary File Read
HIGHVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: product:"Jenkins" || cpe:"cpe:2.3:a:jenkins:jenkins" || http.favicon.hash:81586312 || product:"jenkins"
FOFA: icon_hash=81586312

Scores

CVSS v3 9.8
EPSS 0.9447
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Lab Environment

COMMUNITY
Community Lab
docker pull jenkins/jenkins:2.441-jdk11
docker pull vulhub/jenkins:2.441
+48 more repos

Details

CISA KEV 2024-08-19
VulnCheck KEV 2024-01-30
InTheWild.io 2024-03-19
ENISA EUVD EUVD-2024-0270
Ransomware Use Confirmed
CWE
CWE-22 CWE-27
Status published
Products (3)
jenkins/jenkins < 2.426.3
jenkins/jenkins < 2.442
org.jenkins-ci.main/jenkins-core 1.606 - 2.426.3Maven
Published Jan 24, 2024
KEV Added Aug 19, 2024
Tracked Since Feb 18, 2026