AI Score
Confidence
High
EPSS
Percentile
99.8%
SSVC
Exploitation
active
Automatable
Yes
Technical Impact
total
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an ‘@’ character followed by a file path in an argument with the file’s contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
[
{
"vendor": "Jenkins Project",
"product": "Jenkins",
"versions": [
{
"status": "unaffected",
"version": "0",
"lessThan": "1.606",
"versionType": "maven"
},
{
"status": "unaffected",
"version": "2.442",
"lessThan": "*",
"versionType": "maven"
},
{
"status": "unaffected",
"version": "2.426.3",
"lessThan": "2.426.*",
"versionType": "maven"
},
{
"status": "unaffected",
"version": "2.440.1",
"lessThan": "2.440.*",
"versionType": "maven"
}
],
"defaultStatus": "affected"
}
]
[
{
"cpes": [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*"
],
"vendor": "jenkins",
"product": "jenkins",
"versions": [
{
"status": "unaffected",
"version": "0",
"lessThan": "1.606",
"versionType": "maven"
},
{
"status": "unaffected",
"version": "2.442",
"lessThan": "*",
"versionType": "maven"
},
{
"status": "unaffected",
"version": "2.426.3",
"lessThan": "2.427",
"versionType": "maven"
},
{
"status": "unaffected",
"version": "2.440.1",
"lessThan": "2.441",
"versionType": "maven"
}
],
"defaultStatus": "affected"
}
]
packetstormsecurity.com/files/176839/Jenkins-2.441-LTS-2.426.3-CVE-2024-23897-Scanner.html
packetstormsecurity.com/files/176840/Jenkins-2.441-LTS-2.426.3-Arbitrary-File-Read.html
www.openwall.com/lists/oss-security/2024/01/24/6
www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314
www.sonarsource.com/blog/excessive-expansion-uncovering-critical-security-vulnerabilities-in-jenkins/