CVE-2024-43044
jenkins: Arbitrary file read vulnerability through agent connections can lead to RCE
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
5Exploited in Wild
-Decision
Descriptions
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.
A vulnerability was found in the Remoting library in Jenkins core, which handles communication between the Jenkins controller and agents. The ClassLoaderProxy#fetchJar function may allow malicious agents or attackers with Agent/Connect permission to read arbitrary files from the Jenkins controller's file system due to insufficient path restrictions permissions, which could lead to Privilege Escalation and Remote Code Execution (RCE)
An update for OpenShift Jenkins is now available for Red Hat Product OCP Tools 4.14. Red Hat Product Security has rated this update as having a security impact of critical. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-08-05 CVE Reserved
- 2024-08-07 CVE Published
- 2024-08-08 First Exploit
- 2025-03-14 CVE Updated
- 2025-04-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- CWE-754: Improper Check for Unusual or Exceptional Conditions
CAPEC
References (8)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/v9d0g/CVE-2024-43044-POC | 2024-08-13 | |
https://github.com/HwMex0/CVE-2024-43044 | 2024-08-08 | |
https://github.com/convisolabs/CVE-2024-43044-jenkins | 2024-08-29 | |
https://github.com/jenkinsci-cert/SECURITY-3430 | 2024-09-23 | |
https://github.com/DACC4/CVE-2024-43044-jenkins-creds | 2025-01-12 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3430 | 2024-08-07 | |
https://access.redhat.com/security/cve/CVE-2024-43044 | 2024-08-14 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2303466 | 2024-08-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Jenkins Search vendor "Jenkins" | Jenkins Search vendor "Jenkins" for product "Jenkins" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Ocp Tools Search vendor "Redhat" for product "Ocp Tools" | * | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | * | - |
Affected
|