## https://sploitus.com/exploit?id=6C3D9D87-7A16-5CAB-BB3E-8C974DE46211
# CVE-2024-23897
> Because of a misconfiguration of a default option in the CLI command parser, a attacker can read arbitrary files
## Summary of the CVE
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
## Affected Versions
- Jenkins < 2.442
- Jenkins LTS Edition < 2.426.3
## Anomalies
The Security Advisory states the following:
- Attackers with Overall/Read permission can read the entire file
- Attackers without Overall/Read permission can read the first few lines of a file, depending on available CLI commands
I have not been able to reproduce either of this, so the parsing of the output may be wrong in some cases. Use `--raw` if you feel like this is the case.
## References
- [Jenkins Security Advisory](https://www.jenkins.io/security/advisory/2024-01-24/)
- [Github POC - h4x0r-dz, Jan 26 2024](https://github.com/h4x0r-dz/CVE-2024-23897)
- [CVE-details - CVSS Score 9.8](https://www.cvedetails.com/cve/CVE-2024-23897)