Jenkins Vulnerability Allows Agent Processes to Read Arbitrary Files
CVE-2024-43044
8.8HIGH
Key Information
- Vendor
- Jenkins
- Status
- Jenkins
- Vendor
- CVE Published:
- 7 August 2024
Badges
๐ฅ No. 1 Trending๐ Trended๐พ Exploit Exists๐ด Public PoC
Summary
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.
Affected Version(s)
Jenkins <= 2.452.4
Jenkins >= 2.452.*
Jenkins >= 2.462.*
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
- ๐ฅ
Vulnerability reached the number 1 worldwide trending spot.
Vulnerability started trending.
- ๐พ
Exploit exists.
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database2 Proof of Concept(s)