1. About the Vulnerability

Vulnerability Name

Jenkins Arbitrary File Read Vulnerability (CVE-2024-23897)

Release Date

January 27, 2024

Component Name

Jenkins

Affected Versions

Jenkins ≤ 2.441
Jenkins ≤ LTS 2.426.2

Vulnerability Type

Arbitrary File Read

Severity

CVSS v3 Base Score: 9.8 (Critical)

Exploitability

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

User Interaction: None

Impact

Confidentiality Impact: High

Integrity Impact: High

Availability Impact: High

 

2. About CVE-2024-23897

2.1 About the Component

Jenkins (formerly known as Hudson) is an open-source, Java-based tool for continuous integration. It is mainly used for monitoring continuous software version releases and testing projects and for managing scheduled tasks.

2.2 About the Vulnerability

On January 26, 2024, Sangfor FarSight Labs received notification of the arbitrary file read vulnerability (CVE-2024-23897) in Jenkins, classified as critical (CVSS Score 9.8) by Jenkins.

This vulnerability is caused by an error in the CLI command parser in affected versions of Jenkins. Specifically, the CLI command parser has a feature that replaces an '@' character followed by a file path in an argument with the file's contents. Attackers can exploit this vulnerability by crafting malicious data, resulting in unauthorized access to arbitrary files and potential leakage of sensitive information stored on the server.

3. Affected Versions

VMware Aria Automation 8.14.x

Jenkins ≤ 2.441 Jenkins ≤ LTS 2.426.2

4. Solutions

4.1 Remediation Solutions

4.1.1 Official Solution

Jenkins has released new versions, and affected users are strongly recommended to update to the latest version to fix the vulnerability. For more information, visit https://www.jenkins.io/security/advisory/2024-01-24/

4.2 Sangfor Solutions

4.2.1 Security Monitoring

The following Sangfor products and services perform real-time monitoring of assets affected by the Jenkins arbitrary file read vulnerability (CVE-2024-23897):

4.2.2 Security Protection

The following Sangfor products and services provide protection against the Jenkins arbitrary file read vulnerability (CVE-2024-23897):

5. Timeline

On January 26, 2024, Sangfor FarSight Labs received notification of the Jenkins arbitrary file read vulnerability (CVE-2024-23897).

On January 27, 2024, Sangfor FarSight Labs released a vulnerability alert with remediation solutions.

6. References

https://www.jenkins.io/security/advisory/2024-01-24/

7. About Sangfor FarSight Labs

Sangfor FarSight Labs researches the latest cyberthreats and unknown zero-day vulnerabilities, alerting customers to potential dangers to their organizations, and providing real-time solutions with actionable intelligence. Sangfor FarSight Labs works with other security vendors and the security community at large to identify and verify global cyberthreats, providing fast and easy protection for customers.

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Name
Email Address
Business Phone Number
Tell us about your project requirements

Related Articles

CVE-2024-47575: Fortinet FortiManager Authentication Vulnerability

Date : 25 Oct 2024
Read Now

CVE-2024-38819: Path Traversal Vulnerability

Date : 19 Oct 2024
Read Now

CVE-2024-40766: SonicWALL SonicOS Access Control Flaw Vulnerability

Date : 12 Sep 2024
Read Now

See Other Product

Cyber Command - NDR Platform
Endpoint Secure
Internet Access Gateway (IAG)
Sangfor Network Secure - Next Generation Firewall
Platform-X
Sangfor Access Secure