Skip to main content

CVE-2024-2389

Description

In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command injection vulnerability has been identified.  An unauthenticated user can gain entry to the system via the Flowmon management interface, allowing for the execution of arbitrary system commands.

NVD
Severity: N/A
CVE ID: CVE-2024-2389
CVSS Score: N/A
CVSS Metrics: NVD assessment not yet provided.
Progress Software Corporation
Severity: CRITICAL
CVE ID: CVE-2024-2389
CVSS Score: 10.0
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Refrence: NVDMITRE

Proof Of Concept

Nuclei Templates for CVE-2024-2389
adhikara13

Refrence: GitHub

Content on GitHub

h4x0r-dz | watchers:168

CVE-2024-23897
CVE-2024-23897

Refrence: GitHub

xaitax | watchers:47

CVE-2024-23897
CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner.

Refrence: GitHub

binganao | watchers:97

CVE-2024-23897

Refrence: GitHub

wjlin0 | watchers:52

CVE-2024-23897
CVE-2024-23897 - Jenkins 任意文件读取 利用工具

Refrence: GitHub

Vozec | watchers:11

CVE-2024-23897
This repository presents a proof-of-concept of CVE-2024-23897

Refrence: GitHub

kaanatmacaa | watchers:16

CVE-2024-23897
Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)

Refrence: GitHub

CKevens | watchers:12

CVE-2024-23897
CVE-2024-23897 jenkins-cli

Refrence: GitHub

godylockz | watchers:6

CVE-2024-23897
POC for CVE-2024-23897 Jenkins File-Read

Refrence: GitHub

viszsec | watchers:4

CVE-2024-23897
Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE

Refrence: GitHub

10T4 | watchers:6

PoC-Fix-jenkins-rce_CVE-2024-23897
on this git you can find all information on the CVE-2024-23897

Refrence: GitHub

yoryio | watchers:2

CVE-2024-23897
Scanner for CVE-2024-23897 - Jenkins

Refrence: GitHub

B4CK4TT4CK | watchers:0

CVE-2024-23897
CVE-2024-23897

Refrence: GitHub

ifconfig-me | watchers:0

CVE-2024-23897
Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897]

Refrence: GitHub

ThatNotEasy | watchers:0

CVE-2024-23897
Perform with massive Jenkins Reading-2-RCE

Refrence: GitHub

raheel0x01 | watchers:1

CVE-2024-23897
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

Refrence: GitHub

jopraveen | watchers:1

CVE-2024-23897

Refrence: GitHub

Nebian | watchers:1

CVE-2024-23897
Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins.

Refrence: GitHub

Abo5 | watchers:1

CVE-2024-23897
This is an exploit script for CVE-2024-23897, a vulnerability affecting certain systems. The script is intended for educational and testing purposes only. Ensure that you have the necessary permissions before using it.

Refrence: GitHub

AbraXa5 | watchers:1

Jenkins-CVE-2024-23897
PoC for Jenkins CVE-2024-23897

Refrence: GitHub

brijne | watchers:0

CVE-2024-23897-RCE
CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCE

Refrence: GitHub

WLXQqwer | watchers:0

Jenkins-CVE-2024-23897-

Refrence: GitHub

vmtyan | watchers:1

poc-cve-2024-23897

Refrence: GitHub

pulentoski | watchers:0

CVE-2024-23897-Arbitrary-file-read
Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897

Refrence: GitHub

Praison001 | watchers:1

CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

Refrence: GitHub