CVE-2024-23897

EUVD-2024-0270
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
jenkinsjenkins
𝑥
< 2.426.3
jenkinsjenkins
𝑥
< 2.442
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
jenkinsjenkins
𝑥
< 1.606
ADP
jenkinsjenkins
2.442 ≤
𝑥
< *
ADP
jenkinsjenkins
2.426.3 ≤
𝑥
< 2.427
ADP
jenkinsjenkins
2.440.1 ≤
𝑥
< 2.441
ADP
jenkinsjenkins
𝑥
< 1.606
ADP
jenkinsjenkins
2.442 ≤
𝑥
< *
ADP
jenkinsjenkins
2.426.3 ≤
𝑥
< 2.427
ADP
jenkinsjenkins
2.440.1 ≤
𝑥
< 2.441
ADP
jenkinsjenkins
𝑥
< 1.606
ADP
jenkinsjenkins
2.442 ≤
𝑥
< *
ADP
jenkinsjenkins
2.426.3 ≤
𝑥
< 2.427
ADP
jenkinsjenkins
2.440.1 ≤
𝑥
< 2.441
ADP
jenkinsjenkins
𝑥
< 1.606
ADP
jenkinsjenkins
2.442 ≤
𝑥
< *
ADP
jenkinsjenkins
2.426.3 ≤
𝑥
< 2.427
ADP
jenkinsjenkins
2.440.1 ≤
𝑥
< 2.441
ADP