Jenkins Vulnerability Allows Agent Processes to Read Arbitrary Files

CVE-2024-43044
8.8HIGH

Key Information

Vendor
Jenkins
Status
Jenkins
Vendor
CVE Published:
7 August 2024

Badges

๐Ÿ”ฅ No. 1 Trending๐Ÿ˜„ Trended๐Ÿ‘พ Exploit Exists๐Ÿ”ด Public PoC

Summary

Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.

Affected Version(s)

Jenkins <= 2.452.4

Jenkins >= 2.452.*

Jenkins >= 2.462.*

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿ”ฅ

    Vulnerability reached the number 1 worldwide trending spot.

  • Vulnerability started trending.

  • ๐Ÿ‘พ

    Exploit exists.

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database2 Proof of Concept(s)
.