Several PoC exploits targeting the recent critical Jenkins vulnerability CVE-2024-23897 have been made public

by | Jan 29, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Researchers caution that multiple proof-of-concept (PoC) exploits, aimed at the recently revealed critical Jenkins vulnerability CVE-2024-23897, have been disclosed to the public.

The revelations follow the discovery of two flaws by SonarSource researchers, with the first flaw (CVE-2024-23897) deemed critical, allowing unauthenticated attackers with ‘overall/read’ permissions to read data from arbitrary files on Jenkins servers. Unauthorized access to sensitive information and potential admin privilege escalation are among the risks associated with this flaw.

Exploitation diagramExploitation diagram (SonarSource)

The second flaw, identified as CVE-2024-23898, introduces a cross-site WebSocket hijacking issue, creating a pathway for attackers to execute arbitrary CLI commands by manipulating users into clicking malicious links. Although existing protective policies in web browsers are designed to mitigate this risk, inconsistent enforcement may leave certain vulnerabilities unaddressed.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

SonarSource reported the identified flaws to the Jenkins security team in November 2023, and fixes were released on January 24, 2024, with Jenkins versions 2.442 and LTS 2.426.3. Despite the prompt release of security updates, the public availability of detailed information and PoC exploits has raised concerns, with reports indicating that attackers may have already initiated exploitation attempts in the wild.




Organizations relying on Jenkins are strongly advised to apply the security updates promptly. With the potential for unauthorized remote code execution on unpatched servers, the risks associated with these vulnerabilities necessitate immediate action to safeguard software development processes and sensitive data.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This