Jenkins.LTS.Command.Line.Interface.Arbitrary.File.Read

description-logoDescription

This indicates an attack attempt to exploit an Information Disclosure Vulnerability in Jenkins or LTS.
The vulnerability is due to missing validation when parsing special characters in CLI commands. A remote attacker may be able exploit this to disclose arbitrary files within the context of the application, via a crafted request.

description-logoOutbreak Alert

Cyber threat actors target Jenkins Arbitrary File Read vulnerability (CVE-2024-23897) in ransomware attacks. FortiGuard Labs continues to see active attack telemetry targeting the vulnerability.

View the full Outbreak Alert Report

affected-products-logoAffected Products

Jenkins 2.441 and prior
LTS 2.426.2 and prior

Impact logoImpact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor:
https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Status Detail
2024-03-18 27.750
Modified
Sig Added
2024-03-12 27.747
Modified
Sig Added
2024-02-28 27.741
Modified
Default_action:pass:drop
2024-02-08 26.730
New