CVE-2024-43044

HIGH

Jenkins <2.470 - Info Disclosure

Title source: llm

Description

Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.

Exploits (5)

nomisec WORKING POC 184 stars
by convisolabs · poc
https://github.com/convisolabs/CVE-2024-43044-jenkins
nomisec WORKING POC 20 stars
by v9d0g · poc
https://github.com/v9d0g/CVE-2024-43044-POC
nomisec SCANNER 19 stars
by HwMex0 · poc
https://github.com/HwMex0/CVE-2024-43044
nomisec WORKING POC 2 stars
by jenkinsci-cert · poc
https://github.com/jenkinsci-cert/SECURITY-3430
nomisec WORKING POC
by DACC4 · poc
https://github.com/DACC4/CVE-2024-43044-jenkins-creds

Scores

CVSS v3 8.8
EPSS 0.6590
EPSS Percentile 98.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-754
Status published
Products (4)
jenkins/jenkins < 2.452.4
jenkins/jenkins < 2.471
org.jenkins-ci.main/jenkins-core 0 - 2.452.4Maven
org.jenkins-ci.main/remoting 0 - 3206.3208Maven
Published Aug 07, 2024
Tracked Since Feb 18, 2026