Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23897: Vulnerability in Jenkins Project Jenkins

0
Critical
VulnerabilityCVE-2024-23897cvecve-2024-23897
Published: Wed Jan 24 2024 (01/24/2024, 17:52:22 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins Project
Product: Jenkins

Description

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:24:36 UTC

Technical Analysis

CVE-2024-23897 is a critical security vulnerability affecting Jenkins, a popular open-source automation server widely used for continuous integration and continuous delivery (CI/CD). The flaw exists in Jenkins versions 2.441 and earlier, including LTS 2.426.2 and earlier, within the CLI command parser. Specifically, the parser has a feature that interprets an '@' character followed by a file path in a command argument as an instruction to replace that argument with the contents of the referenced file. This feature is not disabled by default, allowing unauthenticated attackers to exploit it remotely. By crafting CLI commands that include '@' followed by arbitrary file paths, attackers can read sensitive files on the Jenkins controller's file system without any authentication or user interaction. This can lead to exposure of credentials, configuration files, source code, or other sensitive data. The vulnerability is classified under CWE-27 (Improper Handling of Symbolic Links or Paths) and has a CVSS 3.1 base score of 9.8, reflecting its critical nature. Although no public exploits have been reported yet, the ease of exploitation and the critical impact on confidentiality, integrity, and availability make this a severe threat. Jenkins instances exposed to the internet or accessible by untrusted networks are particularly at risk. The vulnerability underscores the importance of securing Jenkins controllers and limiting access to trusted users and networks.

Potential Impact

The impact of CVE-2024-23897 is severe for organizations using affected Jenkins versions. Successful exploitation allows unauthenticated attackers to read arbitrary files on the Jenkins controller, potentially exposing sensitive information such as credentials, private keys, environment variables, build artifacts, and proprietary source code. This can lead to further compromise of the CI/CD pipeline, unauthorized access to connected systems, and intellectual property theft. The integrity of the build process may be undermined if attackers gain insights into configuration files or scripts. Availability could also be affected if attackers leverage disclosed information to disrupt Jenkins operations. Given Jenkins' critical role in software development and deployment, this vulnerability poses a significant risk to organizations' security posture and operational continuity. Enterprises with internet-facing Jenkins instances or those lacking strict network segmentation are at heightened risk of exploitation and subsequent damage.

Mitigation Recommendations

To mitigate CVE-2024-23897, organizations should immediately upgrade Jenkins to a version where this vulnerability is patched once available. Until patches are released, administrators should disable the CLI over remoting or restrict CLI access to trusted networks only. Implement network-level controls such as firewalls or VPNs to limit access to the Jenkins controller. Review and harden Jenkins security settings, including disabling unused features and enforcing strict authentication and authorization policies. Monitor Jenkins logs for unusual CLI command usage that may indicate exploitation attempts. Additionally, consider isolating the Jenkins controller from the internet and applying the principle of least privilege to all Jenkins users and service accounts. Regularly audit Jenkins configurations and update plugins to reduce the attack surface. Employ file integrity monitoring on critical Jenkins files to detect unauthorized access or changes. Finally, educate development and operations teams about this vulnerability and the importance of securing CI/CD infrastructure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2024-01-23T12:46:51.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b2247d717aace269c5

Added to database: 10/21/2025, 7:06:26 PM

Last enriched: 2/28/2026, 9:24:36 AM

Last updated: 3/26/2026, 7:45:03 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses