CVE-2024-2389
Description
In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command injection vulnerability has been identified. An unauthenticated user can gain entry to the system via the Flowmon management interface, allowing for the execution of arbitrary system commands.
Severity: N/A
CVE ID: CVE-2024-2389
CVSS Score: N/A
CVSS Metrics: NVD assessment not yet provided.
Severity: CRITICAL
CVE ID: CVE-2024-2389
CVSS Score: 10.0
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Proof Of Concept
Nuclei Templates for CVE-2024-2389
Refrence: Project Discovery GitHub
adhikara13
Refrence: GitHub
Content on GitHub
h4x0r-dz | watchers:168
CVE-2024-23897
CVE-2024-23897
Refrence: GitHub
xaitax | watchers:47
CVE-2024-23897
CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner.
Refrence: GitHub
binganao | watchers:97
CVE-2024-23897
Refrence: GitHub
wjlin0 | watchers:52
CVE-2024-23897
CVE-2024-23897 - Jenkins 任意文件读取 利用工具
Refrence: GitHub
Vozec | watchers:11
CVE-2024-23897
This repository presents a proof-of-concept of CVE-2024-23897
Refrence: GitHub
kaanatmacaa | watchers:16
CVE-2024-23897
Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)
Refrence: GitHub
CKevens | watchers:12
CVE-2024-23897
CVE-2024-23897 jenkins-cli
Refrence: GitHub
godylockz | watchers:6
CVE-2024-23897
POC for CVE-2024-23897 Jenkins File-Read
Refrence: GitHub
viszsec | watchers:4
CVE-2024-23897
Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE
Refrence: GitHub
10T4 | watchers:6
PoC-Fix-jenkins-rce_CVE-2024-23897
on this git you can find all information on the CVE-2024-23897
Refrence: GitHub
yoryio | watchers:2
CVE-2024-23897
Scanner for CVE-2024-23897 - Jenkins
Refrence: GitHub
B4CK4TT4CK | watchers:0
CVE-2024-23897
CVE-2024-23897
Refrence: GitHub
ifconfig-me | watchers:0
CVE-2024-23897
Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897]
Refrence: GitHub
ThatNotEasy | watchers:0
CVE-2024-23897
Perform with massive Jenkins Reading-2-RCE
Refrence: GitHub
raheel0x01 | watchers:1
CVE-2024-23897
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Refrence: GitHub
jopraveen | watchers:1
CVE-2024-23897
Refrence: GitHub
Nebian | watchers:1
CVE-2024-23897
Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins.
Refrence: GitHub
Abo5 | watchers:1
CVE-2024-23897
This is an exploit script for CVE-2024-23897, a vulnerability affecting certain systems. The script is intended for educational and testing purposes only. Ensure that you have the necessary permissions before using it.
Refrence: GitHub
AbraXa5 | watchers:1
Jenkins-CVE-2024-23897
PoC for Jenkins CVE-2024-23897
Refrence: GitHub
brijne | watchers:0
CVE-2024-23897-RCE
CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCE
Refrence: GitHub
WLXQqwer | watchers:0
Jenkins-CVE-2024-23897-
Refrence: GitHub
vmtyan | watchers:1
poc-cve-2024-23897
Refrence: GitHub
pulentoski | watchers:0
CVE-2024-23897-Arbitrary-file-read
Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897
Refrence: GitHub
Praison001 | watchers:1
CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Refrence: GitHub