Home
Attack
Dataset
Contact Us
Attack
2024 01
T1-24–01–S–N–CL
T2-24–01–S–N–CL
T3-24–01–S–N–CL
T4-24–01–S–E–M
T5-24–01–S–E–LM
T6-24–01–S–E–FH
T7-24–01–M–NE–CLM
T8-24–01–M–NE–CFHL
T9-24–01–M–NE–CLM
2024 02
T1-24–02–S–N–CIKM
T2-24–02–S–N–CL
T3-24–02–S–N–CL
T4-24-02-S-E-M
T5-24-02-S-E-DL
T6-24-02-S-E-DEGN
T7-24-02-M-NE-CDEGLN
T8-24-02-M-NE-CDL
T9-24-02-M-NE-CLH
Dataset
Contact Us
T1-24-02-S-N-CIKM
Jenkins Args4j (CVE-2024-23897)
What is Jenkins?
Jenkins is an open-source automation server that supports Continuous Integration (CI) and Continuous Delivery (CD) in software development. It is highly extensible with numerous plugins, automating tasks such as building, testing, and deploying to improve development efficiency. It is widely used in DevOps environments.
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
OS
IP
Software
Log collection
time
Program
runtime
Attacker
Ubuntu 22.04
172.17.0.1
-
15 sec
30 sec
Victim
Ubuntu 22.04
172.17.0.2
Jenkins 2.441
Installing
python3 -m pip install -r requirements.txt
Using
sudo docker load -i T1-24-02-S-N-CIKM.tar
python3 run.py
MITRE ATT&CK Framework
Attack Tactic
Reconnaissance
Resource Development
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential
Discovery
Lateral Movement
Collection
Command and Control
Exfiltration
Impact
Logs
./log/2024_02_T1_{time}.pcap # YYmmdd_HHMMSS
References
[1]
NIST [CVE-2024-23897]
[2]
Ahalab ASEC [Jenkins 취약점 노출 국내 서버 현황 (CVE-2024-23897, CVE-2024-43044)]
[3]
hackyboiz - ogu123 [CVE-2024-23897: Jenkins 서버의 임의 파일 읽기 취약점]
[4]
Trend Micro [Jenkins Args4j CVE-2024-23897: Files Exposed, Code at Risk]
※ Click on the attack name to see a description and scenario for the attack
2024 02
T1-24–02–S–N–CIKM
T2-24–02–S–N–CL
T3-24–02–S–N–CL
T4-24-02-S-E-M
T5-24-02-S-E-DL
T6-24-02-S-E-DEGN
T7-24-02-M-NE-CDEGLN
T8-24-02-M-NE-CDL
T9-24-02-M-NE-CLH
Copyright(C) 2024, KAIST Cyber Security Reserch Center. All Rights Reserved.