PoC-in-GitHub/2024/CVE-2024-23897.json
2024-09-17 03:30:49 +09:00

969 lines
No EOL
34 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 747359905,
"name": "SECURITY-3314-3315",
"full_name": "jenkinsci-cert\/SECURITY-3314-3315",
"owner": {
"login": "jenkinsci-cert",
"id": 9285726,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9285726?v=4",
"html_url": "https:\/\/github.com\/jenkinsci-cert"
},
"html_url": "https:\/\/github.com\/jenkinsci-cert\/SECURITY-3314-3315",
"description": "Workaround for disabling the CLI to mitigate SECURITY-3314\/CVE-2024-23897 and SECURITY-3315\/CVE-2024-23898",
"fork": false,
"created_at": "2024-01-23T19:19:04Z",
"updated_at": "2024-09-08T23:05:41Z",
"pushed_at": "2024-02-20T14:13:25Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 6
},
{
"id": 748543127,
"name": "CVE-2024-23897",
"full_name": "binganao\/CVE-2024-23897",
"owner": {
"login": "binganao",
"id": 70050083,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70050083?v=4",
"html_url": "https:\/\/github.com\/binganao"
},
"html_url": "https:\/\/github.com\/binganao\/CVE-2024-23897",
"description": null,
"fork": false,
"created_at": "2024-01-26T08:02:00Z",
"updated_at": "2024-09-16T16:36:42Z",
"pushed_at": "2024-02-01T06:50:32Z",
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 95,
"score": 0,
"subscribers_count": 1
},
{
"id": 748577478,
"name": "CVE-2024-23897",
"full_name": "h4x0r-dz\/CVE-2024-23897",
"owner": {
"login": "h4x0r-dz",
"id": 26070859,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
"html_url": "https:\/\/github.com\/h4x0r-dz"
},
"html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-23897",
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-09-07T03:15:23Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 189,
"watchers_count": 189,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 189,
"score": 0,
"subscribers_count": 2
},
{
"id": 748785405,
"name": "CVE-2024-23897",
"full_name": "xaitax\/CVE-2024-23897",
"owner": {
"login": "xaitax",
"id": 5014849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4",
"html_url": "https:\/\/github.com\/xaitax"
},
"html_url": "https:\/\/github.com\/xaitax\/CVE-2024-23897",
"description": "CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. ",
"fork": false,
"created_at": "2024-01-26T19:00:03Z",
"updated_at": "2024-09-12T16:17:54Z",
"pushed_at": "2024-02-29T12:13:21Z",
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 67,
"score": 0,
"subscribers_count": 3
},
{
"id": 748847022,
"name": "poc-cve-2024-23897",
"full_name": "vmtyan\/poc-cve-2024-23897",
"owner": {
"login": "vmtyan",
"id": 157635595,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/157635595?v=4",
"html_url": "https:\/\/github.com\/vmtyan"
},
"html_url": "https:\/\/github.com\/vmtyan\/poc-cve-2024-23897",
"description": null,
"fork": false,
"created_at": "2024-01-26T21:39:26Z",
"updated_at": "2024-02-12T18:38:29Z",
"pushed_at": "2024-01-26T21:46:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 748932948,
"name": "CVE-2024-23897",
"full_name": "yoryio\/CVE-2024-23897",
"owner": {
"login": "yoryio",
"id": 134471901,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134471901?v=4",
"html_url": "https:\/\/github.com\/yoryio"
},
"html_url": "https:\/\/github.com\/yoryio\/CVE-2024-23897",
"description": "Scanner for CVE-2024-23897 - Jenkins",
"fork": false,
"created_at": "2024-01-27T04:35:20Z",
"updated_at": "2024-02-09T17:37:28Z",
"pushed_at": "2024-03-13T05:52:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-23897",
"jenkins"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 749052396,
"name": "CVE-2024-23897",
"full_name": "3yujw7njai\/CVE-2024-23897",
"owner": {
"login": "3yujw7njai",
"id": 7390055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4",
"html_url": "https:\/\/github.com\/3yujw7njai"
},
"html_url": "https:\/\/github.com\/3yujw7njai\/CVE-2024-23897",
"description": "CVE-2024-23897 jenkins-cli",
"fork": false,
"created_at": "2024-01-27T12:57:28Z",
"updated_at": "2024-06-26T01:15:11Z",
"pushed_at": "2024-01-27T13:10:37Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
{
"id": 749060845,
"name": "PoC-Fix-jenkins-rce_CVE-2024-23897",
"full_name": "10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
"owner": {
"login": "10T4",
"id": 148342080,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148342080?v=4",
"html_url": "https:\/\/github.com\/10T4"
},
"html_url": "https:\/\/github.com\/10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
"description": "on this git you can find all information on the CVE-2024-23897",
"fork": false,
"created_at": "2024-01-27T13:27:57Z",
"updated_at": "2024-03-18T21:30:46Z",
"pushed_at": "2024-01-27T14:43:18Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 749172653,
"name": "CVE-2024-23897",
"full_name": "wjlin0\/CVE-2024-23897",
"owner": {
"login": "wjlin0",
"id": 91306421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91306421?v=4",
"html_url": "https:\/\/github.com\/wjlin0"
},
"html_url": "https:\/\/github.com\/wjlin0\/CVE-2024-23897",
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
"fork": false,
"created_at": "2024-01-27T19:34:48Z",
"updated_at": "2024-09-15T08:12:18Z",
"pushed_at": "2024-03-16T07:55:41Z",
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-23897",
"jenkins"
],
"visibility": "public",
"forks": 12,
"watchers": 67,
"score": 0,
"subscribers_count": 2
},
{
"id": 749248494,
"name": "CVE-2024-23897",
"full_name": "Vozec\/CVE-2024-23897",
"owner": {
"login": "Vozec",
"id": 61807609,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61807609?v=4",
"html_url": "https:\/\/github.com\/Vozec"
},
"html_url": "https:\/\/github.com\/Vozec\/CVE-2024-23897",
"description": "This repository presents a proof-of-concept of CVE-2024-23897",
"fork": false,
"created_at": "2024-01-28T01:57:06Z",
"updated_at": "2024-07-12T10:40:08Z",
"pushed_at": "2024-04-16T06:56:39Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 12,
"score": 0,
"subscribers_count": 2
},
{
"id": 749389006,
"name": "CVE-2024-23897",
"full_name": "raheel0x01\/CVE-2024-23897",
"owner": {
"login": "raheel0x01",
"id": 65211256,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
"html_url": "https:\/\/github.com\/raheel0x01"
},
"html_url": "https:\/\/github.com\/raheel0x01\/CVE-2024-23897",
"description": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.",
"fork": false,
"created_at": "2024-01-28T12:53:23Z",
"updated_at": "2024-01-29T18:53:19Z",
"pushed_at": "2024-01-28T13:28:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 749635165,
"name": "CVE-2024-23897",
"full_name": "viszsec\/CVE-2024-23897",
"owner": {
"login": "viszsec",
"id": 8476317,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8476317?v=4",
"html_url": "https:\/\/github.com\/viszsec"
},
"html_url": "https:\/\/github.com\/viszsec\/CVE-2024-23897",
"description": "Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE",
"fork": false,
"created_at": "2024-01-29T04:41:53Z",
"updated_at": "2024-08-16T09:02:15Z",
"pushed_at": "2024-01-31T03:14:07Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 749788968,
"name": "CVE-2024-23897",
"full_name": "jopraveen\/CVE-2024-23897",
"owner": {
"login": "jopraveen",
"id": 56404692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56404692?v=4",
"html_url": "https:\/\/github.com\/jopraveen"
},
"html_url": "https:\/\/github.com\/jopraveen\/CVE-2024-23897",
"description": null,
"fork": false,
"created_at": "2024-01-29T12:00:25Z",
"updated_at": "2024-01-29T18:02:51Z",
"pushed_at": "2024-01-29T12:14:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 751156545,
"name": "Jenkins-CVE-2024-23897",
"full_name": "AbraXa5\/Jenkins-CVE-2024-23897",
"owner": {
"login": "AbraXa5",
"id": 41234094,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41234094?v=4",
"html_url": "https:\/\/github.com\/AbraXa5"
},
"html_url": "https:\/\/github.com\/AbraXa5\/Jenkins-CVE-2024-23897",
"description": "PoC for Jenkins CVE-2024-23897",
"fork": false,
"created_at": "2024-02-01T03:17:35Z",
"updated_at": "2024-02-05T03:54:30Z",
"pushed_at": "2024-02-04T18:31:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 752057600,
"name": "CVE-2024-23897-RCE",
"full_name": "brijne\/CVE-2024-23897-RCE",
"owner": {
"login": "brijne",
"id": 158627341,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158627341?v=4",
"html_url": "https:\/\/github.com\/brijne"
},
"html_url": "https:\/\/github.com\/brijne\/CVE-2024-23897-RCE",
"description": "CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCE",
"fork": false,
"created_at": "2024-02-02T23:13:26Z",
"updated_at": "2024-02-02T23:13:27Z",
"pushed_at": "2024-02-02T23:19:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 752485327,
"name": "Jenkins-CVE-2024-23897-",
"full_name": "WLXQqwer\/Jenkins-CVE-2024-23897-",
"owner": {
"login": "WLXQqwer",
"id": 125850977,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125850977?v=4",
"html_url": "https:\/\/github.com\/WLXQqwer"
},
"html_url": "https:\/\/github.com\/WLXQqwer\/Jenkins-CVE-2024-23897-",
"description": null,
"fork": false,
"created_at": "2024-02-04T01:14:40Z",
"updated_at": "2024-02-04T01:21:30Z",
"pushed_at": "2024-02-04T01:23:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 752803918,
"name": "CVE-2024-23897",
"full_name": "kaanatmacaa\/CVE-2024-23897",
"owner": {
"login": "kaanatmacaa",
"id": 57772940,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57772940?v=4",
"html_url": "https:\/\/github.com\/kaanatmacaa"
},
"html_url": "https:\/\/github.com\/kaanatmacaa\/CVE-2024-23897",
"description": "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)",
"fork": false,
"created_at": "2024-02-04T20:56:42Z",
"updated_at": "2024-07-31T06:07:05Z",
"pushed_at": "2024-02-05T14:10:26Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": true,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},
{
"id": 754184572,
"name": "CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability",
"full_name": "Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability",
"owner": {
"login": "Praison001",
"id": 60835238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
"html_url": "https:\/\/github.com\/Praison001"
},
"html_url": "https:\/\/github.com\/Praison001\/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability",
"description": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.",
"fork": false,
"created_at": "2024-02-07T15:07:37Z",
"updated_at": "2024-08-25T13:20:32Z",
"pushed_at": "2024-02-09T13:22:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 757151446,
"name": "CVE-2024-23897",
"full_name": "B4CK4TT4CK\/CVE-2024-23897",
"owner": {
"login": "B4CK4TT4CK",
"id": 76169213,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76169213?v=4",
"html_url": "https:\/\/github.com\/B4CK4TT4CK"
},
"html_url": "https:\/\/github.com\/B4CK4TT4CK\/CVE-2024-23897",
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-02-13T22:38:50Z",
"updated_at": "2024-02-13T22:40:08Z",
"pushed_at": "2024-02-13T22:44:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 758374072,
"name": "CVE-2024-23897",
"full_name": "godylockz\/CVE-2024-23897",
"owner": {
"login": "godylockz",
"id": 81207744,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81207744?v=4",
"html_url": "https:\/\/github.com\/godylockz"
},
"html_url": "https:\/\/github.com\/godylockz\/CVE-2024-23897",
"description": "POC for CVE-2024-23897 Jenkins File-Read ",
"fork": false,
"created_at": "2024-02-16T07:16:04Z",
"updated_at": "2024-08-27T10:15:45Z",
"pushed_at": "2024-02-17T16:39:19Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 759622445,
"name": "CVE-2024-23897",
"full_name": "ThatNotEasy\/CVE-2024-23897",
"owner": {
"login": "ThatNotEasy",
"id": 25004320,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
"html_url": "https:\/\/github.com\/ThatNotEasy"
},
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-23897",
"description": "Perform with massive Jenkins Reading-2-RCE",
"fork": false,
"created_at": "2024-02-19T02:29:12Z",
"updated_at": "2024-06-26T08:47:06Z",
"pushed_at": "2024-03-02T07:55:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": true,
"forks_count": 1,
"allow_forking": true,
"is_template": true,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 760525998,
"name": "CVE-2024-23897-Arbitrary-file-read",
"full_name": "pulentoski\/CVE-2024-23897-Arbitrary-file-read",
"owner": {
"login": "pulentoski",
"id": 60004847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60004847?v=4",
"html_url": "https:\/\/github.com\/pulentoski"
},
"html_url": "https:\/\/github.com\/pulentoski\/CVE-2024-23897-Arbitrary-file-read",
"description": "Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897 ",
"fork": false,
"created_at": "2024-02-20T15:26:34Z",
"updated_at": "2024-02-20T15:38:30Z",
"pushed_at": "2024-02-20T16:18:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 761368362,
"name": "CVE-2024-23897",
"full_name": "Nebian\/CVE-2024-23897",
"owner": {
"login": "Nebian",
"id": 57531705,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57531705?v=4",
"html_url": "https:\/\/github.com\/Nebian"
},
"html_url": "https:\/\/github.com\/Nebian\/CVE-2024-23897",
"description": "Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins.",
"fork": false,
"created_at": "2024-02-21T18:32:45Z",
"updated_at": "2024-02-23T23:55:35Z",
"pushed_at": "2024-02-21T19:07:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 763302810,
"name": "CVE-2024-23897",
"full_name": "Abo5\/CVE-2024-23897",
"owner": {
"login": "Abo5",
"id": 40110835,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40110835?v=4",
"html_url": "https:\/\/github.com\/Abo5"
},
"html_url": "https:\/\/github.com\/Abo5\/CVE-2024-23897",
"description": "This is an exploit script for CVE-2024-23897, a vulnerability affecting certain systems. The script is intended for educational and testing purposes only. Ensure that you have the necessary permissions before using it.",
"fork": false,
"created_at": "2024-02-26T03:07:28Z",
"updated_at": "2024-02-27T06:15:40Z",
"pushed_at": "2024-02-26T05:14:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 795412184,
"name": "CVE-2024-23897",
"full_name": "JAthulya\/CVE-2024-23897",
"owner": {
"login": "JAthulya",
"id": 55212811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55212811?v=4",
"html_url": "https:\/\/github.com\/JAthulya"
},
"html_url": "https:\/\/github.com\/JAthulya\/CVE-2024-23897",
"description": "Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability",
"fork": false,
"created_at": "2024-05-03T08:18:51Z",
"updated_at": "2024-08-29T16:22:10Z",
"pushed_at": "2024-05-03T08:33:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 797182683,
"name": "CVE-2024-23897",
"full_name": "murataydemir\/CVE-2024-23897",
"owner": {
"login": "murataydemir",
"id": 16391655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
"html_url": "https:\/\/github.com\/murataydemir"
},
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2024-23897",
"description": "[CVE-2024-23897] Jenkins CI Authenticated Arbitrary File Read Through the CLI Leads to Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-05-07T11:00:03Z",
"updated_at": "2024-05-07T14:44:44Z",
"pushed_at": "2024-05-07T14:28:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 797525465,
"name": "CVE-2024-23897-Jenkins-4.441",
"full_name": "mil4ne\/CVE-2024-23897-Jenkins-4.441",
"owner": {
"login": "mil4ne",
"id": 89859279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89859279?v=4",
"html_url": "https:\/\/github.com\/mil4ne"
},
"html_url": "https:\/\/github.com\/mil4ne\/CVE-2024-23897-Jenkins-4.441",
"description": null,
"fork": false,
"created_at": "2024-05-08T02:28:46Z",
"updated_at": "2024-07-26T03:10:16Z",
"pushed_at": "2024-05-08T02:34:04Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 801466453,
"name": "CVE-2024-23897",
"full_name": "Maalfer\/CVE-2024-23897",
"owner": {
"login": "Maalfer",
"id": 96432001,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4",
"html_url": "https:\/\/github.com\/Maalfer"
},
"html_url": "https:\/\/github.com\/Maalfer\/CVE-2024-23897",
"description": "Poc para explotar la vulnerabilidad CVE-2024-23897 en versiones 2.441 y anteriores de Jenkins, mediante la cual podremos leer archivos internos del sistema sin estar autenticados",
"fork": false,
"created_at": "2024-05-16T09:32:51Z",
"updated_at": "2024-08-09T00:23:21Z",
"pushed_at": "2024-05-17T11:54:26Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 806068547,
"name": "Surko-Exploit-Jenkins-CVE-2024-23897",
"full_name": "Surko888\/Surko-Exploit-Jenkins-CVE-2024-23897",
"owner": {
"login": "Surko888",
"id": 69545458,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69545458?v=4",
"html_url": "https:\/\/github.com\/Surko888"
},
"html_url": "https:\/\/github.com\/Surko888\/Surko-Exploit-Jenkins-CVE-2024-23897",
"description": "Un exploit con el que puedes aprovecharte de la vulnerabilidad (CVE-2024-23897)",
"fork": false,
"created_at": "2024-05-26T09:35:54Z",
"updated_at": "2024-06-01T23:48:46Z",
"pushed_at": "2024-06-01T23:48:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 838662184,
"name": "CVE-2024-23897",
"full_name": "NoSpaceAvailable\/CVE-2024-23897",
"owner": {
"login": "NoSpaceAvailable",
"id": 143888307,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143888307?v=4",
"html_url": "https:\/\/github.com\/NoSpaceAvailable"
},
"html_url": "https:\/\/github.com\/NoSpaceAvailable\/CVE-2024-23897",
"description": "Reproduce CVE-202423897",
"fork": false,
"created_at": "2024-08-06T05:27:50Z",
"updated_at": "2024-08-06T16:14:29Z",
"pushed_at": "2024-08-06T16:14:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 851732460,
"name": "Jenkins-Exploit-CVE-2024-23897-Fsociety",
"full_name": "BinaryGoodBoy0101\/Jenkins-Exploit-CVE-2024-23897-Fsociety",
"owner": {
"login": "BinaryGoodBoy0101",
"id": 171997927,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171997927?v=4",
"html_url": "https:\/\/github.com\/BinaryGoodBoy0101"
},
"html_url": "https:\/\/github.com\/BinaryGoodBoy0101\/Jenkins-Exploit-CVE-2024-23897-Fsociety",
"description": "exploit diseñado para aprovechar una vulnerabilidad crítica en Jenkins versiones <= 2.441. La vulnerabilidad, CVE-2024-23897, permite la lectura arbitraria de archivos a través del CLI de Jenkins, lo que puede llevar a la exposición de información sensible o incluso a la ejecución remota de código (RCE) bajo ciertas circunstancias.",
"fork": false,
"created_at": "2024-09-03T16:06:40Z",
"updated_at": "2024-09-03T16:06:41Z",
"pushed_at": "2024-09-03T16:06:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 854769953,
"name": "PBL05-CVE-Analsys",
"full_name": "ShieldAuth-PHP\/PBL05-CVE-Analsys",
"owner": {
"login": "ShieldAuth-PHP",
"id": 180364853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180364853?v=4",
"html_url": "https:\/\/github.com\/ShieldAuth-PHP"
},
"html_url": "https:\/\/github.com\/ShieldAuth-PHP\/PBL05-CVE-Analsys",
"description": "CVE-2024-23897 분석",
"fork": false,
"created_at": "2024-09-09T18:42:34Z",
"updated_at": "2024-09-09T18:43:25Z",
"pushed_at": "2024-09-09T18:42:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]