2025-01-08 01:32:44 +01:00
[
{
"id" : 747359905 ,
"name" : "SECURITY-3314-3315" ,
"full_name" : "jenkinsci-cert\/SECURITY-3314-3315" ,
"owner" : {
"login" : "jenkinsci-cert" ,
"id" : 9285726 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9285726?v=4" ,
"html_url" : "https:\/\/github.com\/jenkinsci-cert" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jenkinsci-cert\/SECURITY-3314-3315" ,
"description" : "Workaround for disabling the CLI to mitigate SECURITY-3314\/CVE-2024-23897 and SECURITY-3315\/CVE-2024-23898" ,
"fork" : false ,
"created_at" : "2024-01-23T19:19:04Z" ,
"updated_at" : "2024-11-23T04:50:22Z" ,
"pushed_at" : "2024-02-20T14:13:25Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 7 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 748543127 ,
"name" : "CVE-2024-23897" ,
"full_name" : "binganao\/CVE-2024-23897" ,
"owner" : {
"login" : "binganao" ,
"id" : 70050083 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70050083?v=4" ,
"html_url" : "https:\/\/github.com\/binganao" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/binganao\/CVE-2024-23897" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-01-26T08:02:00Z" ,
"updated_at" : "2024-12-24T03:28:56Z" ,
"pushed_at" : "2024-02-01T06:50:32Z" ,
"stargazers_count" : 100 ,
"watchers_count" : 100 ,
"has_discussions" : false ,
"forks_count" : 10 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 10 ,
"watchers" : 100 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 748577478 ,
"name" : "CVE-2024-23897" ,
"full_name" : "h4x0r-dz\/CVE-2024-23897" ,
"owner" : {
"login" : "h4x0r-dz" ,
"id" : 26070859 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4" ,
"html_url" : "https:\/\/github.com\/h4x0r-dz" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/h4x0r-dz\/CVE-2024-23897" ,
"description" : "CVE-2024-23897" ,
"fork" : false ,
"created_at" : "2024-01-26T09:44:32Z" ,
"updated_at" : "2024-12-27T15:16:52Z" ,
"pushed_at" : "2024-01-28T06:47:28Z" ,
"stargazers_count" : 197 ,
"watchers_count" : 197 ,
"has_discussions" : false ,
"forks_count" : 36 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 36 ,
"watchers" : 197 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 748785405 ,
"name" : "CVE-2024-23897" ,
"full_name" : "xaitax\/CVE-2024-23897" ,
"owner" : {
"login" : "xaitax" ,
"id" : 5014849 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4" ,
"html_url" : "https:\/\/github.com\/xaitax" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/xaitax\/CVE-2024-23897" ,
"description" : "CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. " ,
"fork" : false ,
"created_at" : "2024-01-26T19:00:03Z" ,
"updated_at" : "2024-11-16T23:00:32Z" ,
"pushed_at" : "2024-02-29T12:13:21Z" ,
"stargazers_count" : 70 ,
"watchers_count" : 70 ,
"has_discussions" : false ,
"forks_count" : 24 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 24 ,
"watchers" : 70 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 748847022 ,
"name" : "poc-cve-2024-23897" ,
"full_name" : "vmtyan\/poc-cve-2024-23897" ,
"owner" : {
"login" : "vmtyan" ,
"id" : 157635595 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/157635595?v=4" ,
"html_url" : "https:\/\/github.com\/vmtyan" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/vmtyan\/poc-cve-2024-23897" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-01-26T21:39:26Z" ,
"updated_at" : "2024-10-05T09:45:00Z" ,
"pushed_at" : "2024-01-26T21:46:10Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 748932948 ,
"name" : "CVE-2024-23897" ,
"full_name" : "yoryio\/CVE-2024-23897" ,
"owner" : {
"login" : "yoryio" ,
"id" : 134471901 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/134471901?v=4" ,
"html_url" : "https:\/\/github.com\/yoryio" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/yoryio\/CVE-2024-23897" ,
"description" : "Scanner for CVE-2024-23897 - Jenkins" ,
"fork" : false ,
"created_at" : "2024-01-27T04:35:20Z" ,
"updated_at" : "2024-02-09T17:37:28Z" ,
"pushed_at" : "2024-03-13T05:52:30Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2024-23897" ,
"jenkins"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 749052396 ,
"name" : "CVE-2024-23897" ,
"full_name" : "3yujw7njai\/CVE-2024-23897" ,
"owner" : {
"login" : "3yujw7njai" ,
"id" : 7390055 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4" ,
"html_url" : "https:\/\/github.com\/3yujw7njai" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/3yujw7njai\/CVE-2024-23897" ,
"description" : "CVE-2024-23897 jenkins-cli" ,
"fork" : false ,
"created_at" : "2024-01-27T12:57:28Z" ,
"updated_at" : "2024-11-18T12:15:19Z" ,
"pushed_at" : "2024-01-27T13:10:37Z" ,
"stargazers_count" : 14 ,
"watchers_count" : 14 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 14 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 749060845 ,
"name" : "PoC-Fix-jenkins-rce_CVE-2024-23897" ,
"full_name" : "10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897" ,
"owner" : {
"login" : "10T4" ,
"id" : 148342080 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/148342080?v=4" ,
"html_url" : "https:\/\/github.com\/10T4" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897" ,
"description" : "on this git you can find all information on the CVE-2024-23897" ,
"fork" : false ,
"created_at" : "2024-01-27T13:27:57Z" ,
"updated_at" : "2024-03-18T21:30:46Z" ,
"pushed_at" : "2024-01-27T14:43:18Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 6 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 749172653 ,
"name" : "CVE-2024-23897" ,
"full_name" : "wjlin0\/CVE-2024-23897" ,
"owner" : {
"login" : "wjlin0" ,
"id" : 91306421 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/91306421?v=4" ,
"html_url" : "https:\/\/github.com\/wjlin0" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/wjlin0\/CVE-2024-23897" ,
"description" : "CVE-2024-23897 - Jenkins 任意文件读取 利用工具" ,
"fork" : false ,
"created_at" : "2024-01-27T19:34:48Z" ,
"updated_at" : "2024-12-02T07:35:19Z" ,
"pushed_at" : "2024-03-16T07:55:41Z" ,
"stargazers_count" : 73 ,
"watchers_count" : 73 ,
"has_discussions" : false ,
"forks_count" : 12 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2024-23897" ,
"jenkins"
] ,
"visibility" : "public" ,
"forks" : 12 ,
"watchers" : 73 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 749248494 ,
"name" : "CVE-2024-23897" ,
"full_name" : "Vozec\/CVE-2024-23897" ,
"owner" : {
"login" : "Vozec" ,
"id" : 61807609 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/61807609?v=4" ,
"html_url" : "https:\/\/github.com\/Vozec" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Vozec\/CVE-2024-23897" ,
"description" : "This repository presents a proof-of-concept of CVE-2024-23897" ,
"fork" : false ,
"created_at" : "2024-01-28T01:57:06Z" ,
"updated_at" : "2024-10-14T07:36:09Z" ,
"pushed_at" : "2024-04-16T06:56:39Z" ,
"stargazers_count" : 14 ,
"watchers_count" : 14 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 14 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 749389006 ,
"name" : "CVE-2024-23897" ,
"full_name" : "r0xdeadbeef\/CVE-2024-23897" ,
"owner" : {
"login" : "r0xdeadbeef" ,
"id" : 65211256 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4" ,
"html_url" : "https:\/\/github.com\/r0xdeadbeef" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/r0xdeadbeef\/CVE-2024-23897" ,
"description" : "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system." ,
"fork" : false ,
"created_at" : "2024-01-28T12:53:23Z" ,
"updated_at" : "2024-01-29T18:53:19Z" ,
"pushed_at" : "2024-01-28T13:28:09Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 749635165 ,
"name" : "CVE-2024-23897" ,
"full_name" : "viszsec\/CVE-2024-23897" ,
"owner" : {
"login" : "viszsec" ,
"id" : 8476317 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8476317?v=4" ,
"html_url" : "https:\/\/github.com\/viszsec" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/viszsec\/CVE-2024-23897" ,
"description" : "Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE" ,
"fork" : false ,
"created_at" : "2024-01-29T04:41:53Z" ,
"updated_at" : "2024-08-16T09:02:15Z" ,
"pushed_at" : "2024-01-31T03:14:07Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 749788968 ,
"name" : "CVE-2024-23897" ,
"full_name" : "jopraveen\/CVE-2024-23897" ,
"owner" : {
"login" : "jopraveen" ,
"id" : 56404692 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/56404692?v=4" ,
"html_url" : "https:\/\/github.com\/jopraveen" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jopraveen\/CVE-2024-23897" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-01-29T12:00:25Z" ,
"updated_at" : "2024-01-29T18:02:51Z" ,
"pushed_at" : "2024-01-29T12:14:08Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 751156545 ,
"name" : "Jenkins-CVE-2024-23897" ,
"full_name" : "AbraXa5\/Jenkins-CVE-2024-23897" ,
"owner" : {
"login" : "AbraXa5" ,
"id" : 41234094 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41234094?v=4" ,
"html_url" : "https:\/\/github.com\/AbraXa5" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/AbraXa5\/Jenkins-CVE-2024-23897" ,
"description" : "PoC for Jenkins CVE-2024-23897" ,
"fork" : false ,
"created_at" : "2024-02-01T03:17:35Z" ,
"updated_at" : "2024-02-05T03:54:30Z" ,
"pushed_at" : "2024-02-04T18:31:47Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 752057600 ,
"name" : "CVE-2024-23897-RCE" ,
"full_name" : "brijne\/CVE-2024-23897-RCE" ,
"owner" : {
"login" : "brijne" ,
"id" : 158627341 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/158627341?v=4" ,
"html_url" : "https:\/\/github.com\/brijne" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/brijne\/CVE-2024-23897-RCE" ,
"description" : "CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCE" ,
"fork" : false ,
"created_at" : "2024-02-02T23:13:26Z" ,
"updated_at" : "2024-02-02T23:13:27Z" ,
"pushed_at" : "2024-02-02T23:19:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 752485327 ,
"name" : "Jenkins-CVE-2024-23897-" ,
"full_name" : "WLXQqwer\/Jenkins-CVE-2024-23897-" ,
"owner" : {
"login" : "WLXQqwer" ,
"id" : 125850977 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/125850977?v=4" ,
"html_url" : "https:\/\/github.com\/WLXQqwer" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/WLXQqwer\/Jenkins-CVE-2024-23897-" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-02-04T01:14:40Z" ,
"updated_at" : "2024-02-04T01:21:30Z" ,
"pushed_at" : "2024-02-04T01:23:45Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 752803918 ,
"name" : "CVE-2024-23897" ,
"full_name" : "kaanatmacaa\/CVE-2024-23897" ,
"owner" : {
"login" : "kaanatmacaa" ,
"id" : 57772940 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57772940?v=4" ,
"html_url" : "https:\/\/github.com\/kaanatmacaa" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/kaanatmacaa\/CVE-2024-23897" ,
"description" : "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)" ,
"fork" : false ,
"created_at" : "2024-02-04T20:56:42Z" ,
"updated_at" : "2024-11-20T20:01:17Z" ,
"pushed_at" : "2024-02-05T14:10:26Z" ,
"stargazers_count" : 19 ,
"watchers_count" : 19 ,
"has_discussions" : true ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 19 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 754184572 ,
"name" : "CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability" ,
"full_name" : "Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability" ,
"owner" : {
"login" : "Praison001" ,
"id" : 60835238 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4" ,
"html_url" : "https:\/\/github.com\/Praison001" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability" ,
"description" : "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system." ,
"fork" : false ,
"created_at" : "2024-02-07T15:07:37Z" ,
"updated_at" : "2024-11-09T20:19:57Z" ,
"pushed_at" : "2024-02-09T13:22:36Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 757151446 ,
"name" : "CVE-2024-23897" ,
"full_name" : "B4CK4TT4CK\/CVE-2024-23897" ,
"owner" : {
"login" : "B4CK4TT4CK" ,
"id" : 76169213 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76169213?v=4" ,
"html_url" : "https:\/\/github.com\/B4CK4TT4CK" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/B4CK4TT4CK\/CVE-2024-23897" ,
"description" : "CVE-2024-23897" ,
"fork" : false ,
"created_at" : "2024-02-13T22:38:50Z" ,
"updated_at" : "2024-02-13T22:40:08Z" ,
"pushed_at" : "2024-02-13T22:44:48Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 758374072 ,
"name" : "CVE-2024-23897" ,
"full_name" : "godylockz\/CVE-2024-23897" ,
"owner" : {
"login" : "godylockz" ,
"id" : 81207744 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/81207744?v=4" ,
"html_url" : "https:\/\/github.com\/godylockz" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/godylockz\/CVE-2024-23897" ,
"description" : "POC for CVE-2024-23897 Jenkins File-Read " ,
"fork" : false ,
"created_at" : "2024-02-16T07:16:04Z" ,
2025-01-13 19:33:09 +01:00
"updated_at" : "2025-01-13T15:00:23Z" ,
"pushed_at" : "2025-01-13T15:00:21Z" ,
2025-01-08 01:32:44 +01:00
"stargazers_count" : 21 ,
"watchers_count" : 21 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 21 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 758722924 ,
"name" : "CVE-2024-23897" ,
"full_name" : "ifconfig-me\/CVE-2024-23897" ,
"owner" : {
"login" : "ifconfig-me" ,
"id" : 25315805 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25315805?v=4" ,
"html_url" : "https:\/\/github.com\/ifconfig-me" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ifconfig-me\/CVE-2024-23897" ,
"description" : "Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897]" ,
"fork" : false ,
"created_at" : "2024-02-16T23:21:40Z" ,
"updated_at" : "2024-02-16T23:23:25Z" ,
"pushed_at" : "2024-02-17T15:20:01Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 759622445 ,
"name" : "CVE-2024-23897" ,
"full_name" : "ThatNotEasy\/CVE-2024-23897" ,
"owner" : {
"login" : "ThatNotEasy" ,
"id" : 25004320 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4" ,
"html_url" : "https:\/\/github.com\/ThatNotEasy" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ThatNotEasy\/CVE-2024-23897" ,
"description" : "Perform with massive Jenkins Reading-2-RCE" ,
"fork" : false ,
"created_at" : "2024-02-19T02:29:12Z" ,
"updated_at" : "2024-10-06T15:53:26Z" ,
"pushed_at" : "2024-03-02T07:55:22Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : true ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : true ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 760525998 ,
"name" : "CVE-2024-23897-Arbitrary-file-read" ,
"full_name" : "pulentoski\/CVE-2024-23897-Arbitrary-file-read" ,
"owner" : {
"login" : "pulentoski" ,
"id" : 60004847 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60004847?v=4" ,
"html_url" : "https:\/\/github.com\/pulentoski" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/pulentoski\/CVE-2024-23897-Arbitrary-file-read" ,
"description" : "Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897 " ,
"fork" : false ,
"created_at" : "2024-02-20T15:26:34Z" ,
"updated_at" : "2024-11-18T19:25:24Z" ,
"pushed_at" : "2024-11-18T19:25:20Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 761368362 ,
"name" : "CVE-2024-23897" ,
"full_name" : "Nebian\/CVE-2024-23897" ,
"owner" : {
"login" : "Nebian" ,
"id" : 57531705 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57531705?v=4" ,
"html_url" : "https:\/\/github.com\/Nebian" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Nebian\/CVE-2024-23897" ,
"description" : "Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins." ,
"fork" : false ,
"created_at" : "2024-02-21T18:32:45Z" ,
"updated_at" : "2024-02-23T23:55:35Z" ,
"pushed_at" : "2024-02-21T19:07:17Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 795412184 ,
"name" : "CVE-2024-23897" ,
"full_name" : "JAthulya\/CVE-2024-23897" ,
"owner" : {
"login" : "JAthulya" ,
"id" : 55212811 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55212811?v=4" ,
"html_url" : "https:\/\/github.com\/JAthulya" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/JAthulya\/CVE-2024-23897" ,
"description" : "Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability" ,
"fork" : false ,
"created_at" : "2024-05-03T08:18:51Z" ,
"updated_at" : "2024-08-29T16:22:10Z" ,
"pushed_at" : "2024-05-03T08:33:11Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 797182683 ,
"name" : "CVE-2024-23897" ,
"full_name" : "murataydemir\/CVE-2024-23897" ,
"owner" : {
"login" : "murataydemir" ,
"id" : 16391655 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4" ,
"html_url" : "https:\/\/github.com\/murataydemir" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/murataydemir\/CVE-2024-23897" ,
"description" : "[CVE-2024-23897] Jenkins CI Authenticated Arbitrary File Read Through the CLI Leads to Remote Code Execution (RCE)" ,
"fork" : false ,
"created_at" : "2024-05-07T11:00:03Z" ,
"updated_at" : "2024-05-07T14:44:44Z" ,
"pushed_at" : "2024-05-07T14:28:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 797525465 ,
"name" : "CVE-2024-23897-Jenkins-4.441" ,
"full_name" : "mil4ne\/CVE-2024-23897-Jenkins-4.441" ,
"owner" : {
"login" : "mil4ne" ,
"id" : 89859279 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/89859279?v=4" ,
"html_url" : "https:\/\/github.com\/mil4ne" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mil4ne\/CVE-2024-23897-Jenkins-4.441" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-05-08T02:28:46Z" ,
"updated_at" : "2024-07-26T03:10:16Z" ,
"pushed_at" : "2024-05-08T02:34:04Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 801466453 ,
"name" : "CVE-2024-23897" ,
"full_name" : "Maalfer\/CVE-2024-23897" ,
"owner" : {
"login" : "Maalfer" ,
"id" : 96432001 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4" ,
"html_url" : "https:\/\/github.com\/Maalfer" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Maalfer\/CVE-2024-23897" ,
"description" : "Poc para explotar la vulnerabilidad CVE-2024-23897 en versiones 2.441 y anteriores de Jenkins, mediante la cual podremos leer archivos internos del sistema sin estar autenticados" ,
"fork" : false ,
"created_at" : "2024-05-16T09:32:51Z" ,
"updated_at" : "2024-11-20T16:30:47Z" ,
"pushed_at" : "2024-05-17T11:54:26Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 7 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 806068547 ,
"name" : "Surko-Exploit-Jenkins-CVE-2024-23897" ,
"full_name" : "Surko888\/Surko-Exploit-Jenkins-CVE-2024-23897" ,
"owner" : {
"login" : "Surko888" ,
"id" : 69545458 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/69545458?v=4" ,
"html_url" : "https:\/\/github.com\/Surko888" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Surko888\/Surko-Exploit-Jenkins-CVE-2024-23897" ,
"description" : "Un exploit con el que puedes aprovecharte de la vulnerabilidad (CVE-2024-23897)" ,
"fork" : false ,
"created_at" : "2024-05-26T09:35:54Z" ,
"updated_at" : "2024-06-01T23:48:46Z" ,
"pushed_at" : "2024-06-01T23:48:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 834942808 ,
"name" : "CVE-2024-23897" ,
"full_name" : "cc3305\/CVE-2024-23897" ,
"owner" : {
"login" : "cc3305" ,
"id" : 103961201 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/103961201?v=4" ,
"html_url" : "https:\/\/github.com\/cc3305" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/cc3305\/CVE-2024-23897" ,
"description" : "CVE-2024-23897 exploit script" ,
"fork" : false ,
"created_at" : "2024-07-28T19:16:13Z" ,
"updated_at" : "2024-10-28T21:16:23Z" ,
"pushed_at" : "2024-10-28T21:15:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 851732460 ,
"name" : "Jenkins-Exploit-CVE-2024-23897-Fsociety" ,
"full_name" : "BinaryGoodBoy0101\/Jenkins-Exploit-CVE-2024-23897-Fsociety" ,
"owner" : {
"login" : "BinaryGoodBoy0101" ,
"id" : 171997927 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/171997927?v=4" ,
"html_url" : "https:\/\/github.com\/BinaryGoodBoy0101" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/BinaryGoodBoy0101\/Jenkins-Exploit-CVE-2024-23897-Fsociety" ,
"description" : "exploit diseñado para aprovechar una vulnerabilidad crítica en Jenkins versiones <= 2.441. La vulnerabilidad, CVE-2024-23897, permite la lectura arbitraria de archivos a través del CLI de Jenkins, lo que puede llevar a la exposición de información sensible o incluso a la ejecución remota de código (RCE) bajo ciertas circunstancias." ,
"fork" : false ,
"created_at" : "2024-09-03T16:06:40Z" ,
"updated_at" : "2024-09-03T16:06:41Z" ,
"pushed_at" : "2024-09-03T16:06:41Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 854769953 ,
"name" : "PBL05-CVE-Analsys" ,
"full_name" : "ShieldAuth-PHP\/PBL05-CVE-Analsys" ,
"owner" : {
"login" : "ShieldAuth-PHP" ,
"id" : 180364853 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/180364853?v=4" ,
"html_url" : "https:\/\/github.com\/ShieldAuth-PHP" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ShieldAuth-PHP\/PBL05-CVE-Analsys" ,
"description" : "CVE-2024-23897 분석" ,
"fork" : false ,
"created_at" : "2024-09-09T18:42:34Z" ,
"updated_at" : "2024-09-09T18:43:25Z" ,
"pushed_at" : "2024-09-09T18:42:34Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 865507408 ,
"name" : "CVE-2024-23897" ,
"full_name" : "verylazytech\/CVE-2024-23897" ,
"owner" : {
"login" : "verylazytech" ,
"id" : 172168670 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4" ,
"html_url" : "https:\/\/github.com\/verylazytech" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/verylazytech\/CVE-2024-23897" ,
"description" : "POC - Jenkins File Read Vulnerability - CVE-2024-23897" ,
"fork" : false ,
"created_at" : "2024-09-30T16:38:28Z" ,
"updated_at" : "2024-12-30T21:06:51Z" ,
"pushed_at" : "2024-11-26T14:46:59Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"2024-23897" ,
"cve-2024-23897" ,
"jenkins-file-read" ,
"poc-cve-2024-23897" ,
"unauthenticated-read" ,
"unauthenticated-read-files"
] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 6 ,
"score" : 0 ,
"subscribers_count" : 1
2025-01-15 07:32:14 +01:00
} ,
{
"id" : 900230397 ,
"name" : "CVE-2024-23897-Vulnerabilidad-Jenkins" ,
"full_name" : "D1se0\/CVE-2024-23897-Vulnerabilidad-Jenkins" ,
"owner" : {
"login" : "D1se0" ,
"id" : 164921056 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4" ,
"html_url" : "https:\/\/github.com\/D1se0" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/D1se0\/CVE-2024-23897-Vulnerabilidad-Jenkins" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-12-08T08:13:34Z" ,
"updated_at" : "2024-12-08T08:46:39Z" ,
"pushed_at" : "2024-12-08T08:46:36Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"auto-mount" ,
"cve-2024-23897" ,
"docker" ,
"docker-container" ,
"ethical-hacking" ,
"hacking" ,
"jenkins" ,
"laboratory"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 911010933 ,
"name" : "jenkins-lfi" ,
"full_name" : "Marouane133\/jenkins-lfi" ,
"owner" : {
"login" : "Marouane133" ,
"id" : 164184419 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/164184419?v=4" ,
"html_url" : "https:\/\/github.com\/Marouane133" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Marouane133\/jenkins-lfi" ,
"description" : "Jenkins CVE-2024-23897 POC : Arbitrary File Read Vulnerability Leading to RCE" ,
"fork" : false ,
"created_at" : "2025-01-02T03:28:56Z" ,
"updated_at" : "2025-01-03T02:56:41Z" ,
"pushed_at" : "2025-01-03T02:56:38Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
2025-01-08 01:32:44 +01:00
}
]