CVE-2024-43044
Arbitrary file read in Jenkins
id: CVE-2024-43044
info:
name: CVE-2024-43044
author: Redflare Cyber
reference:
- https://www.jenkins.io/security/advisory/2024-08-07/ #advisory
- https://github.com/convisolabs/CVE-2024-43044-jenkins #exploit
- https://nvd.nist.gov/vuln/detail/CVE-2024-43044
severity: high
description: Jenkins' Remoting library enables communication between the controller and agents, allowing Java objects and plugins to be executed on agents. Vulnerabilities in versions up to 2.470 and LTS 2.452.3 allow agents and attackers with Agent/Connect permission to read arbitrary files from the controllers file system.
tags: lfr,jenkins
metadata:
shodan-query: 'product:"Jenkins"'
requests:
- method: GET
path:
- "{{BaseURL}}/whoAmI/"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: header
words:
- 'X-Jenkins:'
extractors:
- type: regex
part: header
group: 1
regex:
# Match Jenkins versions up to 2.470 or LTS 2.452.3
- "X-Jenkins: ((2\\.([0-3]?\\d{1,2}|4[0-6]?\\d{0,1}|470))(\\.[0-9]+)?|([0-1]?\\d{1,2})(\\.[0-9]+)?|2\\.452\\.([0-2]|3))"
Last updated