CVE-2024-23897: Jenkins CLI Arbitrary File Read

Score: 9.8
CRITICAL
Published: 2024-01-24Affected: Jenkins <= 2.441 / LTS <= 2.426.2CWE-22 β†—

Can Jenkins be exploited to read files?

Jenkins CLI processes @-prefixed arguments as file paths and reads their contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller. When combined with binary secrets, enables full RCE.

Impact & Exploitation

Exploited in the wild. Public PoC available. Enables reading Jenkins secrets, API tokens, and SSH keys leading to complete CI/CD pipeline compromise.

Precogs Logo

Precogs Research

This vulnerability intelligence report was analyzed and enriched by the Precogs AI Security Team. Our researchers continuously monitor emerging threats across AI code, LLM pipelines, and binary architectures to ensure accurate real-time remediation guidance.

Is Your System Still Exposed to Critical CVEs?

Vulnerabilities like CVE-2024-23897 Jenkins CLI Arbitrary File Read don’t just exist in source code β€” they persist in compiled binaries, containers, and embedded systems. Precogs AI detects vulnerable components across your entire stack β€” even when source code isn’t available.