Add PoC exploit for CVE-2024-23897 #41
Labels
cvss-critical
CVSS: critical
difficulty-medium
Difficulty: medium
exploit-wanted
Exploit Wanted
file-read
Arbitrary File Read
help-wanted
Extra attention is needed
unathenticated
No authentication necessary
Add a PoC exploit for CVE-2024-23897, an arbitrary file-read in Jenkins <= 2.441 and <= LTS 2.426.2.
Reference PoCs
Note: some of these PoCs rely on executing the
jenkins-ci.jar
to interact with the Jenkins server. I prefer the PoCs that directly send the HTTP requests.Vuln App
How to Submit a PoC
See the CONTRIBUTING file for instructions on how to submit a PoC exploit.
The text was updated successfully, but these errors were encountered: