Share
## https://sploitus.com/exploit?id=182FD11B-01BD-564A-B9A7-EB3FCB37837B
# CVE-2024-23897

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

## Exploitation 

Follow these steps to execute the exploit:

1. **Grant Execution Permissions to the Script:**
   ```bash
   chmod +x run_exploit.sh
   ```

2. **Run the Script:**
   ```bash
   ./run_exploit.sh
   ```

# Additional References

To stay abreast of information regarding CVE-2024-23897 and its mitigation, consult the following resources:

1. **CVE-2024-23897 Feed on Feedly:**
   - [CVE-2024-23897 Feed on Feedly](https://feedly.com/cve/CVE-2024-23897)

2. **SecurityOnline Article:**
   - [CVE-2024-23897 - Jenkins Security Vulnerability (Possible RCE)](https://securityonline.info/cve-2024-23897-cvss-9-8-critical-jenkins-security-vulnerability-rce-possible/)

3. **Educational Mitigation Video:**
   - [View the Mitigation Video](https://www.youtube.com/watch?v=UdsjR-pt5uw)