Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add PoC exploit for CVE-2024-23897 #41

Open
postmodern opened this issue May 28, 2024 · 0 comments
Open

Add PoC exploit for CVE-2024-23897 #41

postmodern opened this issue May 28, 2024 · 0 comments
Labels
cvss-critical CVSS: critical difficulty-medium Difficulty: medium exploit-wanted Exploit Wanted file-read Arbitrary File Read help-wanted Extra attention is needed unathenticated No authentication necessary

Comments

@postmodern
Copy link
Member

Add a PoC exploit for CVE-2024-23897, an arbitrary file-read in Jenkins <= 2.441 and <= LTS 2.426.2.

Reference PoCs

Note: some of these PoCs rely on executing the jenkins-ci.jar to interact with the Jenkins server. I prefer the PoCs that directly send the HTTP requests.

Vuln App

How to Submit a PoC

See the CONTRIBUTING file for instructions on how to submit a PoC exploit.

@postmodern postmodern added help-wanted Extra attention is needed exploit-wanted Exploit Wanted difficulty-medium Difficulty: medium cvss-critical CVSS: critical unathenticated No authentication necessary file-read Arbitrary File Read labels May 28, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cvss-critical CVSS: critical difficulty-medium Difficulty: medium exploit-wanted Exploit Wanted file-read Arbitrary File Read help-wanted Extra attention is needed unathenticated No authentication necessary
Projects
None yet
Development

No branches or pull requests

1 participant