Conversation
New assessment for topic: CVE-2024-23897

Topic description: "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system. ..."

"There seems to only be [one main (public) report of exploitation](https://x.com/shoucccc/status/1750601321831633026) that folks are [quoting](https://www.securityweek.com/45000-exposed-jenkins-instances-found-amid-reports-of-in-the-wild-exploitation/) for this CVE, but the UC Berkeley researcher's statement indicated fairly high confidence that they were seeing actual exploitation against honeypots, not just scanning ..."

Link: https://attackerkb.com/assessments/980d6913-83fe-4b34-9e70-394eeee7e004
0
0
0