Jenkins RCE Attack

Released: Aug 20, 2024


High Severity

Jenkins Vendor


Actively exploited in Ransomware campaigns

Cyber threat actors target Jenkins Arbitrary File Read vulnerability (CVE-2024-23897) in ransomware attacks. FortiGuard Labs continues to see active attack telemetry targeting the vulnerability. Learn More »

Common Vulnerabilities and Exposures


Background

Jenkins is an open-source continuous integration (CI) server, and a popular DevOps tool used by thousands of development teams. It manages and controls several stages of the software delivery process, including building, automated testing, packaging, and more.

Jenkins has a built-in Command-Line Interface (CLI) that uses the args4j library to parse command arguments and options on the Jenkins controller during CLI command processing. The vulnerability (CVE-2024-23897) in this library allows unauthenticated users to read the initial lines of any file on the file system, which further leads to RCE.

Additionally, FortiRecon ACI service has observed recent discussions related to CVE-2024-23897 on the Dark Web. Also, a Proof of Concept (PoC) exploit has been made publicly available which makes this vulnerability crucial for patching and detecting any exploitation activity.

Latest Development

Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.


Fortinet customers remain protected through the IPS service and has blocked all the known hashes and Indicators of Compromise (IoCs) in the related campagins. FortiGuard Labs advises organizations to apply the latest Jenkins security updates and patches to fully mitigate any risks.

FortiGuard Cybersecurity Framework

Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.


PROTECT
  • AV

  • Vulnerability

  • IPS

  • Web App Security

DETECT
  • IOC

  • Outbreak Detection

  • Threat Hunting

  • Playbook

RESPOND
  • Automated Response

  • Assisted Response Services

RECOVER
  • NOC/SOC Training

  • End-User Training

IDENTIFY
  • Vulnerability Management

  • Attack Surface Monitoring (Inside & Outside)

  • Attack Surface Hardening

Threat Intelligence

Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.