[ { "id": 747359905, "name": "SECURITY-3314-3315", "full_name": "jenkinsci-cert\/SECURITY-3314-3315", "owner": { "login": "jenkinsci-cert", "id": 9285726, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9285726?v=4", "html_url": "https:\/\/github.com\/jenkinsci-cert" }, "html_url": "https:\/\/github.com\/jenkinsci-cert\/SECURITY-3314-3315", "description": "Workaround for disabling the CLI to mitigate SECURITY-3314\/CVE-2024-23897 and SECURITY-3315\/CVE-2024-23898", "fork": false, "created_at": "2024-01-23T19:19:04Z", "updated_at": "2024-09-08T23:05:41Z", "pushed_at": "2024-02-20T14:13:25Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 8, "score": 0, "subscribers_count": 6 }, { "id": 748543127, "name": "CVE-2024-23897", "full_name": "binganao\/CVE-2024-23897", "owner": { "login": "binganao", "id": 70050083, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70050083?v=4", "html_url": "https:\/\/github.com\/binganao" }, "html_url": "https:\/\/github.com\/binganao\/CVE-2024-23897", "description": null, "fork": false, "created_at": "2024-01-26T08:02:00Z", "updated_at": "2024-09-16T16:36:42Z", "pushed_at": "2024-02-01T06:50:32Z", "stargazers_count": 95, "watchers_count": 95, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 95, "score": 0, "subscribers_count": 1 }, { "id": 748577478, "name": "CVE-2024-23897", "full_name": "h4x0r-dz\/CVE-2024-23897", "owner": { "login": "h4x0r-dz", "id": 26070859, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4", "html_url": "https:\/\/github.com\/h4x0r-dz" }, "html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-23897", "description": "CVE-2024-23897", "fork": false, "created_at": "2024-01-26T09:44:32Z", "updated_at": "2024-09-23T03:28:47Z", "pushed_at": "2024-01-28T06:47:28Z", "stargazers_count": 190, "watchers_count": 190, "has_discussions": false, "forks_count": 36, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 36, "watchers": 190, "score": 0, "subscribers_count": 2 }, { "id": 748785405, "name": "CVE-2024-23897", "full_name": "xaitax\/CVE-2024-23897", "owner": { "login": "xaitax", "id": 5014849, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4", "html_url": "https:\/\/github.com\/xaitax" }, "html_url": "https:\/\/github.com\/xaitax\/CVE-2024-23897", "description": "CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. ", "fork": false, "created_at": "2024-01-26T19:00:03Z", "updated_at": "2024-09-18T22:47:54Z", "pushed_at": "2024-02-29T12:13:21Z", "stargazers_count": 66, "watchers_count": 66, "has_discussions": false, "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 20, "watchers": 66, "score": 0, "subscribers_count": 3 }, { "id": 748847022, "name": "poc-cve-2024-23897", "full_name": "vmtyan\/poc-cve-2024-23897", "owner": { "login": "vmtyan", "id": 157635595, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/157635595?v=4", "html_url": "https:\/\/github.com\/vmtyan" }, "html_url": "https:\/\/github.com\/vmtyan\/poc-cve-2024-23897", "description": null, "fork": false, "created_at": "2024-01-26T21:39:26Z", "updated_at": "2024-10-05T09:45:00Z", "pushed_at": "2024-01-26T21:46:10Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 748932948, "name": "CVE-2024-23897", "full_name": "yoryio\/CVE-2024-23897", "owner": { "login": "yoryio", "id": 134471901, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134471901?v=4", "html_url": "https:\/\/github.com\/yoryio" }, "html_url": "https:\/\/github.com\/yoryio\/CVE-2024-23897", "description": "Scanner for CVE-2024-23897 - Jenkins", "fork": false, "created_at": "2024-01-27T04:35:20Z", "updated_at": "2024-02-09T17:37:28Z", "pushed_at": "2024-03-13T05:52:30Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2024-23897", "jenkins" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 749052396, "name": "CVE-2024-23897", "full_name": "3yujw7njai\/CVE-2024-23897", "owner": { "login": "3yujw7njai", "id": 7390055, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4", "html_url": "https:\/\/github.com\/3yujw7njai" }, "html_url": "https:\/\/github.com\/3yujw7njai\/CVE-2024-23897", "description": "CVE-2024-23897 jenkins-cli", "fork": false, "created_at": "2024-01-27T12:57:28Z", "updated_at": "2024-06-26T01:15:11Z", "pushed_at": "2024-01-27T13:10:37Z", "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 12, "score": 0, "subscribers_count": 1 }, { "id": 749060845, "name": "PoC-Fix-jenkins-rce_CVE-2024-23897", "full_name": "10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897", "owner": { "login": "10T4", "id": 148342080, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148342080?v=4", "html_url": "https:\/\/github.com\/10T4" }, "html_url": "https:\/\/github.com\/10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897", "description": "on this git you can find all information on the CVE-2024-23897", "fork": false, "created_at": "2024-01-27T13:27:57Z", "updated_at": "2024-03-18T21:30:46Z", "pushed_at": "2024-01-27T14:43:18Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 749172653, "name": "CVE-2024-23897", "full_name": "wjlin0\/CVE-2024-23897", "owner": { "login": "wjlin0", "id": 91306421, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91306421?v=4", "html_url": "https:\/\/github.com\/wjlin0" }, "html_url": "https:\/\/github.com\/wjlin0\/CVE-2024-23897", "description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具", "fork": false, "created_at": "2024-01-27T19:34:48Z", "updated_at": "2024-10-05T09:44:25Z", "pushed_at": "2024-03-16T07:55:41Z", "stargazers_count": 69, "watchers_count": 69, "has_discussions": false, "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2024-23897", "jenkins" ], "visibility": "public", "forks": 12, "watchers": 69, "score": 0, "subscribers_count": 2 }, { "id": 749248494, "name": "CVE-2024-23897", "full_name": "Vozec\/CVE-2024-23897", "owner": { "login": "Vozec", "id": 61807609, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61807609?v=4", "html_url": "https:\/\/github.com\/Vozec" }, "html_url": "https:\/\/github.com\/Vozec\/CVE-2024-23897", "description": "This repository presents a proof-of-concept of CVE-2024-23897", "fork": false, "created_at": "2024-01-28T01:57:06Z", "updated_at": "2024-07-12T10:40:08Z", "pushed_at": "2024-04-16T06:56:39Z", "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 12, "score": 0, "subscribers_count": 2 }, { "id": 749389006, "name": "CVE-2024-23897", "full_name": "r0xdeadbeef\/CVE-2024-23897", "owner": { "login": "r0xdeadbeef", "id": 65211256, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4", "html_url": "https:\/\/github.com\/r0xdeadbeef" }, "html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2024-23897", "description": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.", "fork": false, "created_at": "2024-01-28T12:53:23Z", "updated_at": "2024-01-29T18:53:19Z", "pushed_at": "2024-01-28T13:28:09Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 749635165, "name": "CVE-2024-23897", "full_name": "viszsec\/CVE-2024-23897", "owner": { "login": "viszsec", "id": 8476317, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8476317?v=4", "html_url": "https:\/\/github.com\/viszsec" }, "html_url": "https:\/\/github.com\/viszsec\/CVE-2024-23897", "description": "Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE", "fork": false, "created_at": "2024-01-29T04:41:53Z", "updated_at": "2024-08-16T09:02:15Z", "pushed_at": "2024-01-31T03:14:07Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 749788968, "name": "CVE-2024-23897", "full_name": "jopraveen\/CVE-2024-23897", "owner": { "login": "jopraveen", "id": 56404692, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56404692?v=4", "html_url": "https:\/\/github.com\/jopraveen" }, "html_url": "https:\/\/github.com\/jopraveen\/CVE-2024-23897", "description": null, "fork": false, "created_at": "2024-01-29T12:00:25Z", "updated_at": "2024-01-29T18:02:51Z", "pushed_at": "2024-01-29T12:14:08Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 751156545, "name": "Jenkins-CVE-2024-23897", "full_name": "AbraXa5\/Jenkins-CVE-2024-23897", "owner": { "login": "AbraXa5", "id": 41234094, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41234094?v=4", "html_url": "https:\/\/github.com\/AbraXa5" }, "html_url": "https:\/\/github.com\/AbraXa5\/Jenkins-CVE-2024-23897", "description": "PoC for Jenkins CVE-2024-23897", "fork": false, "created_at": "2024-02-01T03:17:35Z", "updated_at": "2024-02-05T03:54:30Z", "pushed_at": "2024-02-04T18:31:47Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 752057600, "name": "CVE-2024-23897-RCE", "full_name": "brijne\/CVE-2024-23897-RCE", "owner": { "login": "brijne", "id": 158627341, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158627341?v=4", "html_url": "https:\/\/github.com\/brijne" }, "html_url": "https:\/\/github.com\/brijne\/CVE-2024-23897-RCE", "description": "CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCE", "fork": false, "created_at": "2024-02-02T23:13:26Z", "updated_at": "2024-02-02T23:13:27Z", "pushed_at": "2024-02-02T23:19:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 752485327, "name": "Jenkins-CVE-2024-23897-", "full_name": "WLXQqwer\/Jenkins-CVE-2024-23897-", "owner": { "login": "WLXQqwer", "id": 125850977, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125850977?v=4", "html_url": "https:\/\/github.com\/WLXQqwer" }, "html_url": "https:\/\/github.com\/WLXQqwer\/Jenkins-CVE-2024-23897-", "description": null, "fork": false, "created_at": "2024-02-04T01:14:40Z", "updated_at": "2024-02-04T01:21:30Z", "pushed_at": "2024-02-04T01:23:45Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 752803918, "name": "CVE-2024-23897", "full_name": "kaanatmacaa\/CVE-2024-23897", "owner": { "login": "kaanatmacaa", "id": 57772940, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57772940?v=4", "html_url": "https:\/\/github.com\/kaanatmacaa" }, "html_url": "https:\/\/github.com\/kaanatmacaa\/CVE-2024-23897", "description": "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)", "fork": false, "created_at": "2024-02-04T20:56:42Z", "updated_at": "2024-07-31T06:07:05Z", "pushed_at": "2024-02-05T14:10:26Z", "stargazers_count": 17, "watchers_count": 17, "has_discussions": true, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 17, "score": 0, "subscribers_count": 1 }, { "id": 754184572, "name": "CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability", "full_name": "Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability", "owner": { "login": "Praison001", "id": 60835238, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4", "html_url": "https:\/\/github.com\/Praison001" }, "html_url": "https:\/\/github.com\/Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability", "description": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.", "fork": false, "created_at": "2024-02-07T15:07:37Z", "updated_at": "2024-08-25T13:20:32Z", "pushed_at": "2024-02-09T13:22:36Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 757151446, "name": "CVE-2024-23897", "full_name": "B4CK4TT4CK\/CVE-2024-23897", "owner": { "login": "B4CK4TT4CK", "id": 76169213, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76169213?v=4", "html_url": "https:\/\/github.com\/B4CK4TT4CK" }, "html_url": "https:\/\/github.com\/B4CK4TT4CK\/CVE-2024-23897", "description": "CVE-2024-23897", "fork": false, "created_at": "2024-02-13T22:38:50Z", "updated_at": "2024-02-13T22:40:08Z", "pushed_at": "2024-02-13T22:44:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 758374072, "name": "CVE-2024-23897", "full_name": "godylockz\/CVE-2024-23897", "owner": { "login": "godylockz", "id": 81207744, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81207744?v=4", "html_url": "https:\/\/github.com\/godylockz" }, "html_url": "https:\/\/github.com\/godylockz\/CVE-2024-23897", "description": "POC for CVE-2024-23897 Jenkins File-Read ", "fork": false, "created_at": "2024-02-16T07:16:04Z", "updated_at": "2024-09-17T14:39:39Z", "pushed_at": "2024-02-17T16:39:19Z", "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 12, "score": 0, "subscribers_count": 1 }, { "id": 758722924, "name": "CVE-2024-23897", "full_name": "ifconfig-me\/CVE-2024-23897", "owner": { "login": "ifconfig-me", "id": 25315805, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315805?v=4", "html_url": "https:\/\/github.com\/ifconfig-me" }, "html_url": "https:\/\/github.com\/ifconfig-me\/CVE-2024-23897", "description": "Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897]", "fork": false, "created_at": "2024-02-16T23:21:40Z", "updated_at": "2024-02-16T23:23:25Z", "pushed_at": "2024-02-17T15:20:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 759622445, "name": "CVE-2024-23897", "full_name": "ThatNotEasy\/CVE-2024-23897", "owner": { "login": "ThatNotEasy", "id": 25004320, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4", "html_url": "https:\/\/github.com\/ThatNotEasy" }, "html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-23897", "description": "Perform with massive Jenkins Reading-2-RCE", "fork": false, "created_at": "2024-02-19T02:29:12Z", "updated_at": "2024-06-26T08:47:06Z", "pushed_at": "2024-03-02T07:55:22Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": true, "forks_count": 1, "allow_forking": true, "is_template": true, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 760525998, "name": "CVE-2024-23897-Arbitrary-file-read", "full_name": "pulentoski\/CVE-2024-23897-Arbitrary-file-read", "owner": { "login": "pulentoski", "id": 60004847, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60004847?v=4", "html_url": "https:\/\/github.com\/pulentoski" }, "html_url": "https:\/\/github.com\/pulentoski\/CVE-2024-23897-Arbitrary-file-read", "description": "Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897 ", "fork": false, "created_at": "2024-02-20T15:26:34Z", "updated_at": "2024-02-20T15:38:30Z", "pushed_at": "2024-02-20T16:18:28Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 761368362, "name": "CVE-2024-23897", "full_name": "Nebian\/CVE-2024-23897", "owner": { "login": "Nebian", "id": 57531705, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57531705?v=4", "html_url": "https:\/\/github.com\/Nebian" }, "html_url": "https:\/\/github.com\/Nebian\/CVE-2024-23897", "description": "Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins.", "fork": false, "created_at": "2024-02-21T18:32:45Z", "updated_at": "2024-02-23T23:55:35Z", "pushed_at": "2024-02-21T19:07:17Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 763302810, "name": "CVE-2024-23897", "full_name": "Abo5\/CVE-2024-23897", "owner": { "login": "Abo5", "id": 40110835, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40110835?v=4", "html_url": "https:\/\/github.com\/Abo5" }, "html_url": "https:\/\/github.com\/Abo5\/CVE-2024-23897", "description": "This is an exploit script for CVE-2024-23897, a vulnerability affecting certain systems. The script is intended for educational and testing purposes only. Ensure that you have the necessary permissions before using it.", "fork": false, "created_at": "2024-02-26T03:07:28Z", "updated_at": "2024-02-27T06:15:40Z", "pushed_at": "2024-02-26T05:14:42Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 795412184, "name": "CVE-2024-23897", "full_name": "JAthulya\/CVE-2024-23897", "owner": { "login": "JAthulya", "id": 55212811, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55212811?v=4", "html_url": "https:\/\/github.com\/JAthulya" }, "html_url": "https:\/\/github.com\/JAthulya\/CVE-2024-23897", "description": "Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability", "fork": false, "created_at": "2024-05-03T08:18:51Z", "updated_at": "2024-08-29T16:22:10Z", "pushed_at": "2024-05-03T08:33:11Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 797182683, "name": "CVE-2024-23897", "full_name": "murataydemir\/CVE-2024-23897", "owner": { "login": "murataydemir", "id": 16391655, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4", "html_url": "https:\/\/github.com\/murataydemir" }, "html_url": "https:\/\/github.com\/murataydemir\/CVE-2024-23897", "description": "[CVE-2024-23897] Jenkins CI Authenticated Arbitrary File Read Through the CLI Leads to Remote Code Execution (RCE)", "fork": false, "created_at": "2024-05-07T11:00:03Z", "updated_at": "2024-05-07T14:44:44Z", "pushed_at": "2024-05-07T14:28:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 797525465, "name": "CVE-2024-23897-Jenkins-4.441", "full_name": "fullaw4ke\/CVE-2024-23897-Jenkins-4.441", "owner": { "login": "fullaw4ke", "id": 89859279, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89859279?v=4", "html_url": "https:\/\/github.com\/fullaw4ke" }, "html_url": "https:\/\/github.com\/fullaw4ke\/CVE-2024-23897-Jenkins-4.441", "description": null, "fork": false, "created_at": "2024-05-08T02:28:46Z", "updated_at": "2024-07-26T03:10:16Z", "pushed_at": "2024-05-08T02:34:04Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 801466453, "name": "CVE-2024-23897", "full_name": "Maalfer\/CVE-2024-23897", "owner": { "login": "Maalfer", "id": 96432001, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4", "html_url": "https:\/\/github.com\/Maalfer" }, "html_url": "https:\/\/github.com\/Maalfer\/CVE-2024-23897", "description": "Poc para explotar la vulnerabilidad CVE-2024-23897 en versiones 2.441 y anteriores de Jenkins, mediante la cual podremos leer archivos internos del sistema sin estar autenticados", "fork": false, "created_at": "2024-05-16T09:32:51Z", "updated_at": "2024-08-09T00:23:21Z", "pushed_at": "2024-05-17T11:54:26Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 806068547, "name": "Surko-Exploit-Jenkins-CVE-2024-23897", "full_name": "Surko888\/Surko-Exploit-Jenkins-CVE-2024-23897", "owner": { "login": "Surko888", "id": 69545458, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69545458?v=4", "html_url": "https:\/\/github.com\/Surko888" }, "html_url": "https:\/\/github.com\/Surko888\/Surko-Exploit-Jenkins-CVE-2024-23897", "description": "Un exploit con el que puedes aprovecharte de la vulnerabilidad (CVE-2024-23897)", "fork": false, "created_at": "2024-05-26T09:35:54Z", "updated_at": "2024-06-01T23:48:46Z", "pushed_at": "2024-06-01T23:48:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 838662184, "name": "CVE-2024-23897", "full_name": "NoSpaceAvailable\/CVE-2024-23897", "owner": { "login": "NoSpaceAvailable", "id": 143888307, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143888307?v=4", "html_url": "https:\/\/github.com\/NoSpaceAvailable" }, "html_url": "https:\/\/github.com\/NoSpaceAvailable\/CVE-2024-23897", "description": "Reproduce CVE-2024–23897", "fork": false, "created_at": "2024-08-06T05:27:50Z", "updated_at": "2024-08-06T16:14:29Z", "pushed_at": "2024-08-06T16:14:26Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 851732460, "name": "Jenkins-Exploit-CVE-2024-23897-Fsociety", "full_name": "BinaryGoodBoy0101\/Jenkins-Exploit-CVE-2024-23897-Fsociety", "owner": { "login": "BinaryGoodBoy0101", "id": 171997927, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171997927?v=4", "html_url": "https:\/\/github.com\/BinaryGoodBoy0101" }, "html_url": "https:\/\/github.com\/BinaryGoodBoy0101\/Jenkins-Exploit-CVE-2024-23897-Fsociety", "description": "exploit diseñado para aprovechar una vulnerabilidad crítica en Jenkins versiones <= 2.441. La vulnerabilidad, CVE-2024-23897, permite la lectura arbitraria de archivos a través del CLI de Jenkins, lo que puede llevar a la exposición de información sensible o incluso a la ejecución remota de código (RCE) bajo ciertas circunstancias.", "fork": false, "created_at": "2024-09-03T16:06:40Z", "updated_at": "2024-09-03T16:06:41Z", "pushed_at": "2024-09-03T16:06:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 854769953, "name": "PBL05-CVE-Analsys", "full_name": "ShieldAuth-PHP\/PBL05-CVE-Analsys", "owner": { "login": "ShieldAuth-PHP", "id": 180364853, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180364853?v=4", "html_url": "https:\/\/github.com\/ShieldAuth-PHP" }, "html_url": "https:\/\/github.com\/ShieldAuth-PHP\/PBL05-CVE-Analsys", "description": "CVE-2024-23897 분석", "fork": false, "created_at": "2024-09-09T18:42:34Z", "updated_at": "2024-09-09T18:43:25Z", "pushed_at": "2024-09-09T18:42:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 865507408, "name": "CVE-2024-23897", "full_name": "verylazytech\/CVE-2024-23897", "owner": { "login": "verylazytech", "id": 172168670, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4", "html_url": "https:\/\/github.com\/verylazytech" }, "html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-23897", "description": "POC - Jenkins File Read Vulnerability - CVE-2024-23897", "fork": false, "created_at": "2024-09-30T16:38:28Z", "updated_at": "2024-10-04T08:02:52Z", "pushed_at": "2024-09-30T17:34:48Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "2024-23897", "cve-2024-23897", "jenkins-file-read", "poc-cve-2024-23897", "unauthenticated-read", "unauthenticated-read-files" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 } ]