[ { "id": 747359905, "name": "SECURITY-3314-3315", "full_name": "jenkinsci-cert\/SECURITY-3314-3315", "owner": { "login": "jenkinsci-cert", "id": 9285726, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9285726?v=4", "html_url": "https:\/\/github.com\/jenkinsci-cert", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jenkinsci-cert\/SECURITY-3314-3315", "description": "Workaround for disabling the CLI to mitigate SECURITY-3314\/CVE-2024-23897 and SECURITY-3315\/CVE-2024-23898", "fork": false, "created_at": "2024-01-23T19:19:04Z", "updated_at": "2024-11-23T04:50:22Z", "pushed_at": "2024-02-20T14:13:25Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 7, "score": 0, "subscribers_count": 6 }, { "id": 748543127, "name": "CVE-2024-23897", "full_name": "binganao\/CVE-2024-23897", "owner": { "login": "binganao", "id": 70050083, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70050083?v=4", "html_url": "https:\/\/github.com\/binganao", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/binganao\/CVE-2024-23897", "description": null, "fork": false, "created_at": "2024-01-26T08:02:00Z", "updated_at": "2024-12-13T00:59:06Z", "pushed_at": "2024-02-01T06:50:32Z", "stargazers_count": 99, "watchers_count": 99, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 99, "score": 0, "subscribers_count": 1 }, { "id": 748577478, "name": "CVE-2024-23897", "full_name": "h4x0r-dz\/CVE-2024-23897", "owner": { "login": "h4x0r-dz", "id": 26070859, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4", "html_url": "https:\/\/github.com\/h4x0r-dz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-23897", "description": "CVE-2024-23897", "fork": false, "created_at": "2024-01-26T09:44:32Z", "updated_at": "2024-12-13T01:07:05Z", "pushed_at": "2024-01-28T06:47:28Z", "stargazers_count": 196, "watchers_count": 196, "has_discussions": false, "forks_count": 36, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 36, "watchers": 196, "score": 0, "subscribers_count": 2 }, { "id": 748785405, "name": "CVE-2024-23897", "full_name": "xaitax\/CVE-2024-23897", "owner": { "login": "xaitax", "id": 5014849, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4", "html_url": "https:\/\/github.com\/xaitax", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xaitax\/CVE-2024-23897", "description": "CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. ", "fork": false, "created_at": "2024-01-26T19:00:03Z", "updated_at": "2024-11-16T23:00:32Z", "pushed_at": "2024-02-29T12:13:21Z", "stargazers_count": 70, "watchers_count": 70, "has_discussions": false, "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 22, "watchers": 70, "score": 0, "subscribers_count": 3 }, { "id": 748847022, "name": "poc-cve-2024-23897", "full_name": "vmtyan\/poc-cve-2024-23897", "owner": { "login": "vmtyan", "id": 157635595, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/157635595?v=4", "html_url": "https:\/\/github.com\/vmtyan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vmtyan\/poc-cve-2024-23897", "description": null, "fork": false, "created_at": "2024-01-26T21:39:26Z", "updated_at": "2024-10-05T09:45:00Z", "pushed_at": "2024-01-26T21:46:10Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 748932948, "name": "CVE-2024-23897", "full_name": "yoryio\/CVE-2024-23897", "owner": { "login": "yoryio", "id": 134471901, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134471901?v=4", "html_url": "https:\/\/github.com\/yoryio", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/yoryio\/CVE-2024-23897", "description": "Scanner for CVE-2024-23897 - Jenkins", "fork": false, "created_at": "2024-01-27T04:35:20Z", "updated_at": "2024-02-09T17:37:28Z", "pushed_at": "2024-03-13T05:52:30Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2024-23897", "jenkins" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 749052396, "name": "CVE-2024-23897", "full_name": "3yujw7njai\/CVE-2024-23897", "owner": { "login": "3yujw7njai", "id": 7390055, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4", "html_url": "https:\/\/github.com\/3yujw7njai", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/3yujw7njai\/CVE-2024-23897", "description": "CVE-2024-23897 jenkins-cli", "fork": false, "created_at": "2024-01-27T12:57:28Z", "updated_at": "2024-11-18T12:15:19Z", "pushed_at": "2024-01-27T13:10:37Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 14, "score": 0, "subscribers_count": 1 }, { "id": 749060845, "name": "PoC-Fix-jenkins-rce_CVE-2024-23897", "full_name": "10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897", "owner": { "login": "10T4", "id": 148342080, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148342080?v=4", "html_url": "https:\/\/github.com\/10T4", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897", "description": "on this git you can find all information on the CVE-2024-23897", "fork": false, "created_at": "2024-01-27T13:27:57Z", "updated_at": "2024-03-18T21:30:46Z", "pushed_at": "2024-01-27T14:43:18Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 749172653, "name": "CVE-2024-23897", "full_name": "wjlin0\/CVE-2024-23897", "owner": { "login": "wjlin0", "id": 91306421, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91306421?v=4", "html_url": "https:\/\/github.com\/wjlin0", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wjlin0\/CVE-2024-23897", "description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具", "fork": false, "created_at": "2024-01-27T19:34:48Z", "updated_at": "2024-12-02T07:35:19Z", "pushed_at": "2024-03-16T07:55:41Z", "stargazers_count": 73, "watchers_count": 73, "has_discussions": false, "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2024-23897", "jenkins" ], "visibility": "public", "forks": 12, "watchers": 73, "score": 0, "subscribers_count": 2 }, { "id": 749248494, "name": "CVE-2024-23897", "full_name": "Vozec\/CVE-2024-23897", "owner": { "login": "Vozec", "id": 61807609, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61807609?v=4", "html_url": "https:\/\/github.com\/Vozec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Vozec\/CVE-2024-23897", "description": "This repository presents a proof-of-concept of CVE-2024-23897", "fork": false, "created_at": "2024-01-28T01:57:06Z", "updated_at": "2024-10-14T07:36:09Z", "pushed_at": "2024-04-16T06:56:39Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 14, "score": 0, "subscribers_count": 2 }, { "id": 749389006, "name": "CVE-2024-23897", "full_name": "r0xdeadbeef\/CVE-2024-23897", "owner": { "login": "r0xdeadbeef", "id": 65211256, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4", "html_url": "https:\/\/github.com\/r0xdeadbeef", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2024-23897", "description": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.", "fork": false, "created_at": "2024-01-28T12:53:23Z", "updated_at": "2024-01-29T18:53:19Z", "pushed_at": "2024-01-28T13:28:09Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 749635165, "name": "CVE-2024-23897", "full_name": "viszsec\/CVE-2024-23897", "owner": { "login": "viszsec", "id": 8476317, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8476317?v=4", "html_url": "https:\/\/github.com\/viszsec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/viszsec\/CVE-2024-23897", "description": "Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE", "fork": false, "created_at": "2024-01-29T04:41:53Z", "updated_at": "2024-08-16T09:02:15Z", "pushed_at": "2024-01-31T03:14:07Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 749788968, "name": "CVE-2024-23897", "full_name": "jopraveen\/CVE-2024-23897", "owner": { "login": "jopraveen", "id": 56404692, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56404692?v=4", "html_url": "https:\/\/github.com\/jopraveen", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jopraveen\/CVE-2024-23897", "description": null, "fork": false, "created_at": "2024-01-29T12:00:25Z", "updated_at": "2024-01-29T18:02:51Z", "pushed_at": "2024-01-29T12:14:08Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 751156545, "name": "Jenkins-CVE-2024-23897", "full_name": "AbraXa5\/Jenkins-CVE-2024-23897", "owner": { "login": "AbraXa5", "id": 41234094, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41234094?v=4", "html_url": "https:\/\/github.com\/AbraXa5", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AbraXa5\/Jenkins-CVE-2024-23897", "description": "PoC for Jenkins CVE-2024-23897", "fork": false, "created_at": "2024-02-01T03:17:35Z", "updated_at": "2024-02-05T03:54:30Z", "pushed_at": "2024-02-04T18:31:47Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 752057600, "name": "CVE-2024-23897-RCE", "full_name": "brijne\/CVE-2024-23897-RCE", "owner": { "login": "brijne", "id": 158627341, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158627341?v=4", "html_url": "https:\/\/github.com\/brijne", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/brijne\/CVE-2024-23897-RCE", "description": "CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCE", "fork": false, "created_at": "2024-02-02T23:13:26Z", "updated_at": "2024-02-02T23:13:27Z", "pushed_at": "2024-02-02T23:19:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 752485327, "name": "Jenkins-CVE-2024-23897-", "full_name": "WLXQqwer\/Jenkins-CVE-2024-23897-", "owner": { "login": "WLXQqwer", "id": 125850977, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125850977?v=4", "html_url": "https:\/\/github.com\/WLXQqwer", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/WLXQqwer\/Jenkins-CVE-2024-23897-", "description": null, "fork": false, "created_at": "2024-02-04T01:14:40Z", "updated_at": "2024-02-04T01:21:30Z", "pushed_at": "2024-02-04T01:23:45Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 752803918, "name": "CVE-2024-23897", "full_name": "kaanatmacaa\/CVE-2024-23897", "owner": { "login": "kaanatmacaa", "id": 57772940, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57772940?v=4", "html_url": "https:\/\/github.com\/kaanatmacaa", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kaanatmacaa\/CVE-2024-23897", "description": "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)", "fork": false, "created_at": "2024-02-04T20:56:42Z", "updated_at": "2024-11-20T20:01:17Z", "pushed_at": "2024-02-05T14:10:26Z", "stargazers_count": 19, "watchers_count": 19, "has_discussions": true, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 19, "score": 0, "subscribers_count": 1 }, { "id": 754184572, "name": "CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability", "full_name": "Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability", "owner": { "login": "Praison001", "id": 60835238, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4", "html_url": "https:\/\/github.com\/Praison001", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability", "description": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.", "fork": false, "created_at": "2024-02-07T15:07:37Z", "updated_at": "2024-11-09T20:19:57Z", "pushed_at": "2024-02-09T13:22:36Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 757151446, "name": "CVE-2024-23897", "full_name": "B4CK4TT4CK\/CVE-2024-23897", "owner": { "login": "B4CK4TT4CK", "id": 76169213, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76169213?v=4", "html_url": "https:\/\/github.com\/B4CK4TT4CK", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/B4CK4TT4CK\/CVE-2024-23897", "description": "CVE-2024-23897", "fork": false, "created_at": "2024-02-13T22:38:50Z", "updated_at": "2024-02-13T22:40:08Z", "pushed_at": "2024-02-13T22:44:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 758374072, "name": "CVE-2024-23897", "full_name": "godylockz\/CVE-2024-23897", "owner": { "login": "godylockz", "id": 81207744, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81207744?v=4", "html_url": "https:\/\/github.com\/godylockz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/godylockz\/CVE-2024-23897", "description": "POC for CVE-2024-23897 Jenkins File-Read ", "fork": false, "created_at": "2024-02-16T07:16:04Z", "updated_at": "2024-12-04T18:06:10Z", "pushed_at": "2024-02-17T16:39:19Z", "stargazers_count": 19, "watchers_count": 19, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 19, "score": 0, "subscribers_count": 1 }, { "id": 758722924, "name": "CVE-2024-23897", "full_name": "ifconfig-me\/CVE-2024-23897", "owner": { "login": "ifconfig-me", "id": 25315805, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315805?v=4", "html_url": "https:\/\/github.com\/ifconfig-me", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ifconfig-me\/CVE-2024-23897", "description": "Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897]", "fork": false, "created_at": "2024-02-16T23:21:40Z", "updated_at": "2024-02-16T23:23:25Z", "pushed_at": "2024-02-17T15:20:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 759622445, "name": "CVE-2024-23897", "full_name": "ThatNotEasy\/CVE-2024-23897", "owner": { "login": "ThatNotEasy", "id": 25004320, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4", "html_url": "https:\/\/github.com\/ThatNotEasy", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-23897", "description": "Perform with massive Jenkins Reading-2-RCE", "fork": false, "created_at": "2024-02-19T02:29:12Z", "updated_at": "2024-10-06T15:53:26Z", "pushed_at": "2024-03-02T07:55:22Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": true, "forks_count": 1, "allow_forking": true, "is_template": true, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 760525998, "name": "CVE-2024-23897-Arbitrary-file-read", "full_name": "pulentoski\/CVE-2024-23897-Arbitrary-file-read", "owner": { "login": "pulentoski", "id": 60004847, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60004847?v=4", "html_url": "https:\/\/github.com\/pulentoski", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pulentoski\/CVE-2024-23897-Arbitrary-file-read", "description": "Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897 ", "fork": false, "created_at": "2024-02-20T15:26:34Z", "updated_at": "2024-11-18T19:25:24Z", "pushed_at": "2024-11-18T19:25:20Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 761368362, "name": "CVE-2024-23897", "full_name": "Nebian\/CVE-2024-23897", "owner": { "login": "Nebian", "id": 57531705, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57531705?v=4", "html_url": "https:\/\/github.com\/Nebian", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Nebian\/CVE-2024-23897", "description": "Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins.", "fork": false, "created_at": "2024-02-21T18:32:45Z", "updated_at": "2024-02-23T23:55:35Z", "pushed_at": "2024-02-21T19:07:17Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 795412184, "name": "CVE-2024-23897", "full_name": "JAthulya\/CVE-2024-23897", "owner": { "login": "JAthulya", "id": 55212811, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55212811?v=4", "html_url": "https:\/\/github.com\/JAthulya", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JAthulya\/CVE-2024-23897", "description": "Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability", "fork": false, "created_at": "2024-05-03T08:18:51Z", "updated_at": "2024-08-29T16:22:10Z", "pushed_at": "2024-05-03T08:33:11Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 797182683, "name": "CVE-2024-23897", "full_name": "murataydemir\/CVE-2024-23897", "owner": { "login": "murataydemir", "id": 16391655, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4", "html_url": "https:\/\/github.com\/murataydemir", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/murataydemir\/CVE-2024-23897", "description": "[CVE-2024-23897] Jenkins CI Authenticated Arbitrary File Read Through the CLI Leads to Remote Code Execution (RCE)", "fork": false, "created_at": "2024-05-07T11:00:03Z", "updated_at": "2024-05-07T14:44:44Z", "pushed_at": "2024-05-07T14:28:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 797525465, "name": "CVE-2024-23897-Jenkins-4.441", "full_name": "mil4ne\/CVE-2024-23897-Jenkins-4.441", "owner": { "login": "mil4ne", "id": 89859279, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89859279?v=4", "html_url": "https:\/\/github.com\/mil4ne", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mil4ne\/CVE-2024-23897-Jenkins-4.441", "description": null, "fork": false, "created_at": "2024-05-08T02:28:46Z", "updated_at": "2024-07-26T03:10:16Z", "pushed_at": "2024-05-08T02:34:04Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 801466453, "name": "CVE-2024-23897", "full_name": "Maalfer\/CVE-2024-23897", "owner": { "login": "Maalfer", "id": 96432001, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4", "html_url": "https:\/\/github.com\/Maalfer", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Maalfer\/CVE-2024-23897", "description": "Poc para explotar la vulnerabilidad CVE-2024-23897 en versiones 2.441 y anteriores de Jenkins, mediante la cual podremos leer archivos internos del sistema sin estar autenticados", "fork": false, "created_at": "2024-05-16T09:32:51Z", "updated_at": "2024-11-20T16:30:47Z", "pushed_at": "2024-05-17T11:54:26Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 7, "score": 0, "subscribers_count": 2 }, { "id": 806068547, "name": "Surko-Exploit-Jenkins-CVE-2024-23897", "full_name": "Surko888\/Surko-Exploit-Jenkins-CVE-2024-23897", "owner": { "login": "Surko888", "id": 69545458, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69545458?v=4", "html_url": "https:\/\/github.com\/Surko888", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Surko888\/Surko-Exploit-Jenkins-CVE-2024-23897", "description": "Un exploit con el que puedes aprovecharte de la vulnerabilidad (CVE-2024-23897)", "fork": false, "created_at": "2024-05-26T09:35:54Z", "updated_at": "2024-06-01T23:48:46Z", "pushed_at": "2024-06-01T23:48:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 834942808, "name": "CVE-2024-23897", "full_name": "cc3305\/CVE-2024-23897", "owner": { "login": "cc3305", "id": 103961201, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103961201?v=4", "html_url": "https:\/\/github.com\/cc3305", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cc3305\/CVE-2024-23897", "description": "CVE-2024-23897 exploit script", "fork": false, "created_at": "2024-07-28T19:16:13Z", "updated_at": "2024-10-28T21:16:23Z", "pushed_at": "2024-10-28T21:15:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 851732460, "name": "Jenkins-Exploit-CVE-2024-23897-Fsociety", "full_name": "BinaryGoodBoy0101\/Jenkins-Exploit-CVE-2024-23897-Fsociety", "owner": { "login": "BinaryGoodBoy0101", "id": 171997927, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171997927?v=4", "html_url": "https:\/\/github.com\/BinaryGoodBoy0101", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/BinaryGoodBoy0101\/Jenkins-Exploit-CVE-2024-23897-Fsociety", "description": "exploit diseñado para aprovechar una vulnerabilidad crítica en Jenkins versiones <= 2.441. La vulnerabilidad, CVE-2024-23897, permite la lectura arbitraria de archivos a través del CLI de Jenkins, lo que puede llevar a la exposición de información sensible o incluso a la ejecución remota de código (RCE) bajo ciertas circunstancias.", "fork": false, "created_at": "2024-09-03T16:06:40Z", "updated_at": "2024-09-03T16:06:41Z", "pushed_at": "2024-09-03T16:06:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 854769953, "name": "PBL05-CVE-Analsys", "full_name": "ShieldAuth-PHP\/PBL05-CVE-Analsys", "owner": { "login": "ShieldAuth-PHP", "id": 180364853, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180364853?v=4", "html_url": "https:\/\/github.com\/ShieldAuth-PHP", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ShieldAuth-PHP\/PBL05-CVE-Analsys", "description": "CVE-2024-23897 분석", "fork": false, "created_at": "2024-09-09T18:42:34Z", "updated_at": "2024-09-09T18:43:25Z", "pushed_at": "2024-09-09T18:42:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 865507408, "name": "CVE-2024-23897", "full_name": "verylazytech\/CVE-2024-23897", "owner": { "login": "verylazytech", "id": 172168670, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4", "html_url": "https:\/\/github.com\/verylazytech", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-23897", "description": "POC - Jenkins File Read Vulnerability - CVE-2024-23897", "fork": false, "created_at": "2024-09-30T16:38:28Z", "updated_at": "2024-11-26T21:33:10Z", "pushed_at": "2024-11-26T14:46:59Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "2024-23897", "cve-2024-23897", "jenkins-file-read", "poc-cve-2024-23897", "unauthenticated-read", "unauthenticated-read-files" ], "visibility": "public", "forks": 2, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 900230397, "name": "CVE-2024-23897-Vulnerabilidad-Jenkins", "full_name": "D1se0\/CVE-2024-23897-Vulnerabilidad-Jenkins", "owner": { "login": "D1se0", "id": 164921056, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4", "html_url": "https:\/\/github.com\/D1se0", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/D1se0\/CVE-2024-23897-Vulnerabilidad-Jenkins", "description": null, "fork": false, "created_at": "2024-12-08T08:13:34Z", "updated_at": "2024-12-08T08:46:39Z", "pushed_at": "2024-12-08T08:46:36Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "auto-mount", "cve-2024-23897", "docker", "docker-container", "ethical-hacking", "hacking", "jenkins", "laboratory" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 } ]