# CVE-2024-23897

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

## Exploitation 

Follow these steps to execute the exploit:

1. **Grant Execution Permissions to the Script:**
   chmod +x

2. **Run the Script:**

# Additional References

To stay abreast of information regarding CVE-2024-23897 and its mitigation, consult the following resources:

1. **CVE-2024-23897 Feed on Feedly:**
   - [CVE-2024-23897 Feed on Feedly](

2. **SecurityOnline Article:**
   - [CVE-2024-23897 - Jenkins Security Vulnerability (Possible RCE)](

3. **Educational Mitigation Video:**
   - [View the Mitigation Video](