First published: Wed Jan 24 2024(Updated: )
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Credit: Matisse Beckandt jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <2.442 | 2.442 |
redhat/Jenkins LTS | <2.426.3 | 2.426.3 |
maven/org.jenkins-ci.main:jenkins-core | >=2.427<2.440.1 | 2.440.1 |
maven/org.jenkins-ci.main:jenkins-core | =2.441 | 2.442 |
maven/org.jenkins-ci.main:jenkins-core | >=1.606<=2.426.2 | 2.426.3 |
Jenkins CI/CD automation server | =2.442 | |
Jenkins CI/CD automation server | =LTS 2.426.3 | |
Jenkins Command Line Interface | ||
Jenkins LTS | <2.426.3 | |
Jenkins LTS | <2.442 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23897 is considered a critical vulnerability due to its potential to allow unauthenticated attackers to read arbitrary files on the Jenkins controller.
To fix CVE-2024-23897, upgrade Jenkins to version 2.442 or LTS version 2.426.3 immediately.
CVE-2024-23897 affects Jenkins versions 2.441 and earlier, as well as LTS version 2.426.2 and earlier.
CVE-2024-23897 enables unauthenticated attackers to exploit the CLI command parser to read sensitive files on the Jenkins controller.
There is no official workaround for CVE-2024-23897; immediate upgrading is the recommended action.