PoC-in-GitHub/2024/CVE-2024-23897.json
2025-01-15 15:32:14 +09:00

1110 lines
No EOL
39 KiB
JSON

[
{
"id": 747359905,
"name": "SECURITY-3314-3315",
"full_name": "jenkinsci-cert\/SECURITY-3314-3315",
"owner": {
"login": "jenkinsci-cert",
"id": 9285726,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9285726?v=4",
"html_url": "https:\/\/github.com\/jenkinsci-cert",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jenkinsci-cert\/SECURITY-3314-3315",
"description": "Workaround for disabling the CLI to mitigate SECURITY-3314\/CVE-2024-23897 and SECURITY-3315\/CVE-2024-23898",
"fork": false,
"created_at": "2024-01-23T19:19:04Z",
"updated_at": "2024-11-23T04:50:22Z",
"pushed_at": "2024-02-20T14:13:25Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 6
},
{
"id": 748543127,
"name": "CVE-2024-23897",
"full_name": "binganao\/CVE-2024-23897",
"owner": {
"login": "binganao",
"id": 70050083,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70050083?v=4",
"html_url": "https:\/\/github.com\/binganao",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/binganao\/CVE-2024-23897",
"description": null,
"fork": false,
"created_at": "2024-01-26T08:02:00Z",
"updated_at": "2024-12-24T03:28:56Z",
"pushed_at": "2024-02-01T06:50:32Z",
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 100,
"score": 0,
"subscribers_count": 1
},
{
"id": 748577478,
"name": "CVE-2024-23897",
"full_name": "h4x0r-dz\/CVE-2024-23897",
"owner": {
"login": "h4x0r-dz",
"id": 26070859,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
"html_url": "https:\/\/github.com\/h4x0r-dz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-23897",
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-12-27T15:16:52Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 197,
"watchers_count": 197,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 197,
"score": 0,
"subscribers_count": 2
},
{
"id": 748785405,
"name": "CVE-2024-23897",
"full_name": "xaitax\/CVE-2024-23897",
"owner": {
"login": "xaitax",
"id": 5014849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4",
"html_url": "https:\/\/github.com\/xaitax",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xaitax\/CVE-2024-23897",
"description": "CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. ",
"fork": false,
"created_at": "2024-01-26T19:00:03Z",
"updated_at": "2024-11-16T23:00:32Z",
"pushed_at": "2024-02-29T12:13:21Z",
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 70,
"score": 0,
"subscribers_count": 3
},
{
"id": 748847022,
"name": "poc-cve-2024-23897",
"full_name": "vmtyan\/poc-cve-2024-23897",
"owner": {
"login": "vmtyan",
"id": 157635595,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/157635595?v=4",
"html_url": "https:\/\/github.com\/vmtyan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vmtyan\/poc-cve-2024-23897",
"description": null,
"fork": false,
"created_at": "2024-01-26T21:39:26Z",
"updated_at": "2024-10-05T09:45:00Z",
"pushed_at": "2024-01-26T21:46:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 748932948,
"name": "CVE-2024-23897",
"full_name": "yoryio\/CVE-2024-23897",
"owner": {
"login": "yoryio",
"id": 134471901,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134471901?v=4",
"html_url": "https:\/\/github.com\/yoryio",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yoryio\/CVE-2024-23897",
"description": "Scanner for CVE-2024-23897 - Jenkins",
"fork": false,
"created_at": "2024-01-27T04:35:20Z",
"updated_at": "2024-02-09T17:37:28Z",
"pushed_at": "2024-03-13T05:52:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-23897",
"jenkins"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 749052396,
"name": "CVE-2024-23897",
"full_name": "3yujw7njai\/CVE-2024-23897",
"owner": {
"login": "3yujw7njai",
"id": 7390055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4",
"html_url": "https:\/\/github.com\/3yujw7njai",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/3yujw7njai\/CVE-2024-23897",
"description": "CVE-2024-23897 jenkins-cli",
"fork": false,
"created_at": "2024-01-27T12:57:28Z",
"updated_at": "2024-11-18T12:15:19Z",
"pushed_at": "2024-01-27T13:10:37Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},
{
"id": 749060845,
"name": "PoC-Fix-jenkins-rce_CVE-2024-23897",
"full_name": "10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
"owner": {
"login": "10T4",
"id": 148342080,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148342080?v=4",
"html_url": "https:\/\/github.com\/10T4",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
"description": "on this git you can find all information on the CVE-2024-23897",
"fork": false,
"created_at": "2024-01-27T13:27:57Z",
"updated_at": "2024-03-18T21:30:46Z",
"pushed_at": "2024-01-27T14:43:18Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 749172653,
"name": "CVE-2024-23897",
"full_name": "wjlin0\/CVE-2024-23897",
"owner": {
"login": "wjlin0",
"id": 91306421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91306421?v=4",
"html_url": "https:\/\/github.com\/wjlin0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wjlin0\/CVE-2024-23897",
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
"fork": false,
"created_at": "2024-01-27T19:34:48Z",
"updated_at": "2024-12-02T07:35:19Z",
"pushed_at": "2024-03-16T07:55:41Z",
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-23897",
"jenkins"
],
"visibility": "public",
"forks": 12,
"watchers": 73,
"score": 0,
"subscribers_count": 2
},
{
"id": 749248494,
"name": "CVE-2024-23897",
"full_name": "Vozec\/CVE-2024-23897",
"owner": {
"login": "Vozec",
"id": 61807609,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61807609?v=4",
"html_url": "https:\/\/github.com\/Vozec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Vozec\/CVE-2024-23897",
"description": "This repository presents a proof-of-concept of CVE-2024-23897",
"fork": false,
"created_at": "2024-01-28T01:57:06Z",
"updated_at": "2024-10-14T07:36:09Z",
"pushed_at": "2024-04-16T06:56:39Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 14,
"score": 0,
"subscribers_count": 2
},
{
"id": 749389006,
"name": "CVE-2024-23897",
"full_name": "r0xdeadbeef\/CVE-2024-23897",
"owner": {
"login": "r0xdeadbeef",
"id": 65211256,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
"html_url": "https:\/\/github.com\/r0xdeadbeef",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2024-23897",
"description": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.",
"fork": false,
"created_at": "2024-01-28T12:53:23Z",
"updated_at": "2024-01-29T18:53:19Z",
"pushed_at": "2024-01-28T13:28:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 749635165,
"name": "CVE-2024-23897",
"full_name": "viszsec\/CVE-2024-23897",
"owner": {
"login": "viszsec",
"id": 8476317,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8476317?v=4",
"html_url": "https:\/\/github.com\/viszsec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/viszsec\/CVE-2024-23897",
"description": "Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE",
"fork": false,
"created_at": "2024-01-29T04:41:53Z",
"updated_at": "2024-08-16T09:02:15Z",
"pushed_at": "2024-01-31T03:14:07Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 749788968,
"name": "CVE-2024-23897",
"full_name": "jopraveen\/CVE-2024-23897",
"owner": {
"login": "jopraveen",
"id": 56404692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56404692?v=4",
"html_url": "https:\/\/github.com\/jopraveen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jopraveen\/CVE-2024-23897",
"description": null,
"fork": false,
"created_at": "2024-01-29T12:00:25Z",
"updated_at": "2024-01-29T18:02:51Z",
"pushed_at": "2024-01-29T12:14:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 751156545,
"name": "Jenkins-CVE-2024-23897",
"full_name": "AbraXa5\/Jenkins-CVE-2024-23897",
"owner": {
"login": "AbraXa5",
"id": 41234094,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41234094?v=4",
"html_url": "https:\/\/github.com\/AbraXa5",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AbraXa5\/Jenkins-CVE-2024-23897",
"description": "PoC for Jenkins CVE-2024-23897",
"fork": false,
"created_at": "2024-02-01T03:17:35Z",
"updated_at": "2024-02-05T03:54:30Z",
"pushed_at": "2024-02-04T18:31:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 752057600,
"name": "CVE-2024-23897-RCE",
"full_name": "brijne\/CVE-2024-23897-RCE",
"owner": {
"login": "brijne",
"id": 158627341,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158627341?v=4",
"html_url": "https:\/\/github.com\/brijne",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/brijne\/CVE-2024-23897-RCE",
"description": "CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCE",
"fork": false,
"created_at": "2024-02-02T23:13:26Z",
"updated_at": "2024-02-02T23:13:27Z",
"pushed_at": "2024-02-02T23:19:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 752485327,
"name": "Jenkins-CVE-2024-23897-",
"full_name": "WLXQqwer\/Jenkins-CVE-2024-23897-",
"owner": {
"login": "WLXQqwer",
"id": 125850977,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125850977?v=4",
"html_url": "https:\/\/github.com\/WLXQqwer",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/WLXQqwer\/Jenkins-CVE-2024-23897-",
"description": null,
"fork": false,
"created_at": "2024-02-04T01:14:40Z",
"updated_at": "2024-02-04T01:21:30Z",
"pushed_at": "2024-02-04T01:23:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 752803918,
"name": "CVE-2024-23897",
"full_name": "kaanatmacaa\/CVE-2024-23897",
"owner": {
"login": "kaanatmacaa",
"id": 57772940,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57772940?v=4",
"html_url": "https:\/\/github.com\/kaanatmacaa",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kaanatmacaa\/CVE-2024-23897",
"description": "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)",
"fork": false,
"created_at": "2024-02-04T20:56:42Z",
"updated_at": "2024-11-20T20:01:17Z",
"pushed_at": "2024-02-05T14:10:26Z",
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": true,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},
{
"id": 754184572,
"name": "CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability",
"full_name": "Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability",
"owner": {
"login": "Praison001",
"id": 60835238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
"html_url": "https:\/\/github.com\/Praison001",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability",
"description": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.",
"fork": false,
"created_at": "2024-02-07T15:07:37Z",
"updated_at": "2024-11-09T20:19:57Z",
"pushed_at": "2024-02-09T13:22:36Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 757151446,
"name": "CVE-2024-23897",
"full_name": "B4CK4TT4CK\/CVE-2024-23897",
"owner": {
"login": "B4CK4TT4CK",
"id": 76169213,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76169213?v=4",
"html_url": "https:\/\/github.com\/B4CK4TT4CK",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/B4CK4TT4CK\/CVE-2024-23897",
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-02-13T22:38:50Z",
"updated_at": "2024-02-13T22:40:08Z",
"pushed_at": "2024-02-13T22:44:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 758374072,
"name": "CVE-2024-23897",
"full_name": "godylockz\/CVE-2024-23897",
"owner": {
"login": "godylockz",
"id": 81207744,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81207744?v=4",
"html_url": "https:\/\/github.com\/godylockz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/godylockz\/CVE-2024-23897",
"description": "POC for CVE-2024-23897 Jenkins File-Read ",
"fork": false,
"created_at": "2024-02-16T07:16:04Z",
"updated_at": "2025-01-13T15:00:23Z",
"pushed_at": "2025-01-13T15:00:21Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},
{
"id": 758722924,
"name": "CVE-2024-23897",
"full_name": "ifconfig-me\/CVE-2024-23897",
"owner": {
"login": "ifconfig-me",
"id": 25315805,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315805?v=4",
"html_url": "https:\/\/github.com\/ifconfig-me",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ifconfig-me\/CVE-2024-23897",
"description": "Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897]",
"fork": false,
"created_at": "2024-02-16T23:21:40Z",
"updated_at": "2024-02-16T23:23:25Z",
"pushed_at": "2024-02-17T15:20:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 759622445,
"name": "CVE-2024-23897",
"full_name": "ThatNotEasy\/CVE-2024-23897",
"owner": {
"login": "ThatNotEasy",
"id": 25004320,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
"html_url": "https:\/\/github.com\/ThatNotEasy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-23897",
"description": "Perform with massive Jenkins Reading-2-RCE",
"fork": false,
"created_at": "2024-02-19T02:29:12Z",
"updated_at": "2024-10-06T15:53:26Z",
"pushed_at": "2024-03-02T07:55:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": true,
"forks_count": 1,
"allow_forking": true,
"is_template": true,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 760525998,
"name": "CVE-2024-23897-Arbitrary-file-read",
"full_name": "pulentoski\/CVE-2024-23897-Arbitrary-file-read",
"owner": {
"login": "pulentoski",
"id": 60004847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60004847?v=4",
"html_url": "https:\/\/github.com\/pulentoski",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pulentoski\/CVE-2024-23897-Arbitrary-file-read",
"description": "Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897 ",
"fork": false,
"created_at": "2024-02-20T15:26:34Z",
"updated_at": "2024-11-18T19:25:24Z",
"pushed_at": "2024-11-18T19:25:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 761368362,
"name": "CVE-2024-23897",
"full_name": "Nebian\/CVE-2024-23897",
"owner": {
"login": "Nebian",
"id": 57531705,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57531705?v=4",
"html_url": "https:\/\/github.com\/Nebian",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nebian\/CVE-2024-23897",
"description": "Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins.",
"fork": false,
"created_at": "2024-02-21T18:32:45Z",
"updated_at": "2024-02-23T23:55:35Z",
"pushed_at": "2024-02-21T19:07:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 795412184,
"name": "CVE-2024-23897",
"full_name": "JAthulya\/CVE-2024-23897",
"owner": {
"login": "JAthulya",
"id": 55212811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55212811?v=4",
"html_url": "https:\/\/github.com\/JAthulya",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JAthulya\/CVE-2024-23897",
"description": "Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability",
"fork": false,
"created_at": "2024-05-03T08:18:51Z",
"updated_at": "2024-08-29T16:22:10Z",
"pushed_at": "2024-05-03T08:33:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 797182683,
"name": "CVE-2024-23897",
"full_name": "murataydemir\/CVE-2024-23897",
"owner": {
"login": "murataydemir",
"id": 16391655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
"html_url": "https:\/\/github.com\/murataydemir",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2024-23897",
"description": "[CVE-2024-23897] Jenkins CI Authenticated Arbitrary File Read Through the CLI Leads to Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-05-07T11:00:03Z",
"updated_at": "2024-05-07T14:44:44Z",
"pushed_at": "2024-05-07T14:28:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 797525465,
"name": "CVE-2024-23897-Jenkins-4.441",
"full_name": "mil4ne\/CVE-2024-23897-Jenkins-4.441",
"owner": {
"login": "mil4ne",
"id": 89859279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89859279?v=4",
"html_url": "https:\/\/github.com\/mil4ne",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mil4ne\/CVE-2024-23897-Jenkins-4.441",
"description": null,
"fork": false,
"created_at": "2024-05-08T02:28:46Z",
"updated_at": "2024-07-26T03:10:16Z",
"pushed_at": "2024-05-08T02:34:04Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 801466453,
"name": "CVE-2024-23897",
"full_name": "Maalfer\/CVE-2024-23897",
"owner": {
"login": "Maalfer",
"id": 96432001,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4",
"html_url": "https:\/\/github.com\/Maalfer",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Maalfer\/CVE-2024-23897",
"description": "Poc para explotar la vulnerabilidad CVE-2024-23897 en versiones 2.441 y anteriores de Jenkins, mediante la cual podremos leer archivos internos del sistema sin estar autenticados",
"fork": false,
"created_at": "2024-05-16T09:32:51Z",
"updated_at": "2024-11-20T16:30:47Z",
"pushed_at": "2024-05-17T11:54:26Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 806068547,
"name": "Surko-Exploit-Jenkins-CVE-2024-23897",
"full_name": "Surko888\/Surko-Exploit-Jenkins-CVE-2024-23897",
"owner": {
"login": "Surko888",
"id": 69545458,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69545458?v=4",
"html_url": "https:\/\/github.com\/Surko888",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Surko888\/Surko-Exploit-Jenkins-CVE-2024-23897",
"description": "Un exploit con el que puedes aprovecharte de la vulnerabilidad (CVE-2024-23897)",
"fork": false,
"created_at": "2024-05-26T09:35:54Z",
"updated_at": "2024-06-01T23:48:46Z",
"pushed_at": "2024-06-01T23:48:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 834942808,
"name": "CVE-2024-23897",
"full_name": "cc3305\/CVE-2024-23897",
"owner": {
"login": "cc3305",
"id": 103961201,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103961201?v=4",
"html_url": "https:\/\/github.com\/cc3305",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cc3305\/CVE-2024-23897",
"description": "CVE-2024-23897 exploit script",
"fork": false,
"created_at": "2024-07-28T19:16:13Z",
"updated_at": "2024-10-28T21:16:23Z",
"pushed_at": "2024-10-28T21:15:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 851732460,
"name": "Jenkins-Exploit-CVE-2024-23897-Fsociety",
"full_name": "BinaryGoodBoy0101\/Jenkins-Exploit-CVE-2024-23897-Fsociety",
"owner": {
"login": "BinaryGoodBoy0101",
"id": 171997927,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171997927?v=4",
"html_url": "https:\/\/github.com\/BinaryGoodBoy0101",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BinaryGoodBoy0101\/Jenkins-Exploit-CVE-2024-23897-Fsociety",
"description": "exploit diseñado para aprovechar una vulnerabilidad crítica en Jenkins versiones <= 2.441. La vulnerabilidad, CVE-2024-23897, permite la lectura arbitraria de archivos a través del CLI de Jenkins, lo que puede llevar a la exposición de información sensible o incluso a la ejecución remota de código (RCE) bajo ciertas circunstancias.",
"fork": false,
"created_at": "2024-09-03T16:06:40Z",
"updated_at": "2024-09-03T16:06:41Z",
"pushed_at": "2024-09-03T16:06:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 854769953,
"name": "PBL05-CVE-Analsys",
"full_name": "ShieldAuth-PHP\/PBL05-CVE-Analsys",
"owner": {
"login": "ShieldAuth-PHP",
"id": 180364853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180364853?v=4",
"html_url": "https:\/\/github.com\/ShieldAuth-PHP",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ShieldAuth-PHP\/PBL05-CVE-Analsys",
"description": "CVE-2024-23897 분석",
"fork": false,
"created_at": "2024-09-09T18:42:34Z",
"updated_at": "2024-09-09T18:43:25Z",
"pushed_at": "2024-09-09T18:42:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 865507408,
"name": "CVE-2024-23897",
"full_name": "verylazytech\/CVE-2024-23897",
"owner": {
"login": "verylazytech",
"id": 172168670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
"html_url": "https:\/\/github.com\/verylazytech",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-23897",
"description": "POC - Jenkins File Read Vulnerability - CVE-2024-23897",
"fork": false,
"created_at": "2024-09-30T16:38:28Z",
"updated_at": "2024-12-30T21:06:51Z",
"pushed_at": "2024-11-26T14:46:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"2024-23897",
"cve-2024-23897",
"jenkins-file-read",
"poc-cve-2024-23897",
"unauthenticated-read",
"unauthenticated-read-files"
],
"visibility": "public",
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 900230397,
"name": "CVE-2024-23897-Vulnerabilidad-Jenkins",
"full_name": "D1se0\/CVE-2024-23897-Vulnerabilidad-Jenkins",
"owner": {
"login": "D1se0",
"id": 164921056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4",
"html_url": "https:\/\/github.com\/D1se0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D1se0\/CVE-2024-23897-Vulnerabilidad-Jenkins",
"description": null,
"fork": false,
"created_at": "2024-12-08T08:13:34Z",
"updated_at": "2024-12-08T08:46:39Z",
"pushed_at": "2024-12-08T08:46:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"auto-mount",
"cve-2024-23897",
"docker",
"docker-container",
"ethical-hacking",
"hacking",
"jenkins",
"laboratory"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 911010933,
"name": "jenkins-lfi",
"full_name": "Marouane133\/jenkins-lfi",
"owner": {
"login": "Marouane133",
"id": 164184419,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164184419?v=4",
"html_url": "https:\/\/github.com\/Marouane133",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Marouane133\/jenkins-lfi",
"description": "Jenkins CVE-2024-23897 POC : Arbitrary File Read Vulnerability Leading to RCE",
"fork": false,
"created_at": "2025-01-02T03:28:56Z",
"updated_at": "2025-01-03T02:56:41Z",
"pushed_at": "2025-01-03T02:56:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]