Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6f9g-cxwr-q5jr Arbitrary file read vulnerability through the Jenkins CLI can lead to RCE
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 30 Jul 2025 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'Yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 29 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'Yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 20 Aug 2024 23:00:00 +0000

Type Values Removed Values Added
References

Tue, 20 Aug 2024 14:00:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo CWE-22

Mon, 19 Aug 2024 17:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-27

Mon, 19 Aug 2024 16:30:00 +0000


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-07-30T01:37:08.171Z

Reserved: 2024-01-23T12:46:51.263Z

Link: CVE-2024-23897

cve-icon Vulnrichment

Updated: 2024-08-19T07:48:11.721Z

cve-icon NVD

Status : Analyzed

Published: 2024-01-24T18:15:09.370

Modified: 2024-12-20T17:30:33.613

Link: CVE-2024-23897

cve-icon Redhat

Severity : Critical

Publid Date: 2024-01-09T00:00:00Z

Links: CVE-2024-23897 - Bugzilla

cve-icon OpenCVE Enrichment

No data.