home.social

#cve_2024_23897 — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cve_2024_23897, aggregated by home.social.

  1. Trend Micro is a bit late talking about CVE-2024-23897 (9.8 critical, disclosed 24 January 2024, has Proof of Concept) Jenkins Server Arbitrary file read vulnerability. The vulnerability exists in the args4j library, allowing an unauthenticated user to read the first few lines of any files on the file system, leading to remote code execution. If I’m reading this correctly, Trend Micro reports active exploitation of CVE-2024-23897, predominantly from the Netherlands (no IOC provided). 🔗 trendmicro.com/en_us/research/ They provide vulnerability analyses similar to Sonar Source, explaining attack scenarios and what commands are available for both unauthenticated/authenticated users.

    #CVE_2024_23897 #Jenkins #RCE #eitw #activeexploitation #PoC #proofofconcept #vulnerability

  2. Good morning! Have a fairly gnarly RCE in #Jenkins:

    Jenkins uses the args4j library to parse command arguments and options on the Jenkins controller when processing CLI commands. This command parser has a feature that replaces an @ character followed by a file path in an argument with the file’s contents (expandAtFiles). This feature is enabled by default and Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable it.
    www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314

    #CVE_2024_23897