## https://sploitus.com/exploit?id=182FD11B-01BD-564A-B9A7-EB3FCB37837B
# CVE-2024-23897
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
## Exploitation
Follow these steps to execute the exploit:
1. **Grant Execution Permissions to the Script:**
```bash
chmod +x run_exploit.sh
```
2. **Run the Script:**
```bash
./run_exploit.sh
```
# Additional References
To stay abreast of information regarding CVE-2024-23897 and its mitigation, consult the following resources:
1. **CVE-2024-23897 Feed on Feedly:**
- [CVE-2024-23897 Feed on Feedly](https://feedly.com/cve/CVE-2024-23897)
2. **SecurityOnline Article:**
- [CVE-2024-23897 - Jenkins Security Vulnerability (Possible RCE)](https://securityonline.info/cve-2024-23897-cvss-9-8-critical-jenkins-security-vulnerability-rce-possible/)
3. **Educational Mitigation Video:**
- [View the Mitigation Video](https://www.youtube.com/watch?v=UdsjR-pt5uw)