{"vulnerability": "CVE-2024-43044", "sightings": [{"uuid": "54e8d20f-2ec5-489b-9d60-8428a5f64e3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8222", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aThis repository provides a workaround preventing exploitation of SECURITY-3430 / CVE-2024-43044\nURL\uff1ahttps://github.com/jenkinsci-cert/SECURITY-3430\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-09T15:10:26.000000Z"}, {"uuid": "8b2582b4-6909-4ccb-8474-28b151c7189e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7627", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43044\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.\n\ud83d\udccf Published: 2024-08-07T13:27:11.438Z\n\ud83d\udccf Modified: 2025-03-14T19:38:08.229Z\n\ud83d\udd17 References:\n1. https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3430", "creation_timestamp": "2025-03-14T19:44:54.000000Z"}, {"uuid": "7bb247d8-0696-43b9-adfb-945379b0fba8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/12387", "content": "\u200aCVE-2024-43044: Critical Jenkins Vulnerability Exposes Servers to RCE, PoC Exploit Published\n\nhttps://securityonline.info/cve-2024-43044-critical-jenkins-vulnerability-exposes-servers-to-rce-poc-exploit-published/", "creation_timestamp": "2024-09-08T17:47:08.000000Z"}, {"uuid": "be525946-b26a-42e8-8a6b-1dbd72938eba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/253", "content": "#exploit\n1. CVE-2024-43044:\nFrom file read to RCE in Jenkins through agents\nhttps://blog.convisoappsec.com/en/analysis-of-cve-2024-43044\n\n2. CVE-2024-42815:\nBuffer Overflow in TP-Link Routers\nhttps://securityonline.info/cve-2024-42815-cvss-9-8-buffer-overflow-flaw-in-tp-link-routers-opens-door-to-rce", "creation_timestamp": "2024-09-03T15:37:31.000000Z"}, {"uuid": "f0ecce00-6a1c-45a5-ac57-a189a8ae4208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/BlackHat0Hackers/3134", "content": "CVE-2024-43044 Arbitrary file read vulnerability through agent connections can lead to RCE in Jenkins\n\nThe exploit will use the vulnerability to read files to forge a remember-me cookie for an admin account and gain access to Jenkins scripting engine.\n\nBlog: https://blog.convisoappsec.com/en/analysis-of-cve-2024-43044/\n\nSearch Query:\nHUNTER:/product.name=\"Jenkins\"\nSHODAN: product:\"Jenkins\"\nFOFA: app=\"Jenkins\"\nZoomEye: app:\"Jenkins\"", "creation_timestamp": "2024-08-30T16:58:51.000000Z"}, {"uuid": "69cc071f-05f6-432b-962d-514ca7fc8dc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "Telegram/JGfzzXtxFrlVd1kwyDuMoX5gNQqU-o9-vKMbvbjyj_iKe9k", "content": "", "creation_timestamp": "2024-09-27T18:49:57.000000Z"}, {"uuid": "421b4379-0b72-47d9-b7f0-9519efca5759", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/haccking/11305", "content": "\u0410\u043d\u0430\u043b\u0438\u0437 CVE-2024-43044 \u2014 \u043e\u0442 \u0447\u0442\u0435\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432 \u0434\u043e \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0432 Jenkins \u0447\u0435\u0440\u0435\u0437 \u0430\u0433\u0435\u043d\u0442\u043e\u0432\n\n#cve #rce #\u043f\u0435\u0440\u0435\u0432\u043e\u0434 #\u0441\u0442\u0430\u0442\u044c\u044f #Jenkins\n\n\u0412 \u044d\u0442\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u043c\u044b \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0438\u043c \u043a\u043e\u043d\u0441\u0443\u043b\u044c\u0442\u0430\u0442\u0438\u0432\u043d\u043e\u0435 \u0437\u0430\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u043f\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-43044, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0443\u044e \u0441 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u043c \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 Jenkins. \u041c\u044b \u043f\u043e\u043a\u0430\u0436\u0435\u043c, \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u044d\u0441\u043a\u0430\u043b\u0430\u0446\u0438\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0441 \u0446\u0435\u043b\u044c\u044e \u0434\u043e\u0441\u0442\u0438\u0436\u0435\u043d\u0438\u044f \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 (RCE) \u043d\u0430 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u0435 Jenkins \u043f\u0440\u0438 \u0437\u0430\u0445\u0432\u0430\u0442\u0435 \u0430\u0433\u0435\u043d\u0442\u0430 Jenkins.\n\n\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 \u0441\u0442\u0430\u0442\u044c\u044e.\n\nLH | \u041d\u043e\u0432\u043e\u0441\u0442\u0438 | \u041a\u0443\u0440\u0441\u044b | \u041c\u0435\u043c\u044b\n\n#\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u044f\n#\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438", "creation_timestamp": "2024-10-13T13:15:10.000000Z"}, {"uuid": "a8e18f0f-8f7b-4bb5-a01c-d0abbe68eb5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9079", "content": "Analysis of CVE-2024-43044 \u2014 From file read to RCE in Jenkins through agents\n\nhttps://blog.convisoappsec.com/en/analysis-of-cve-2024-43044/", "creation_timestamp": "2024-08-30T10:45:41.000000Z"}, {"uuid": "8343e8cf-1df8-49b0-9bd5-17b5c1b9a3f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "exploited", "source": "https://t.me/Rootsec_2/4316", "content": "CVE-2024-43044 Arbitrary file read vulnerability through agent connections can lead to RCE\n\nThe exploit will use the vulnerability to read files to forge a remember-me cookie for an admin account and gain access to Jenkins scripting engine.\n\nBlog: https://blog.convisoappsec.com/en/analysis-of-cve-2024-43044/\n\nSearch Query:\nHUNTER:/product.name=\"Jenkins\"\nSHODAN: product:\"Jenkins\"\nFOFA: app=\"Jenkins\"\nZoomEye: app:\"Jenkins\"", "creation_timestamp": "2024-08-30T21:14:44.000000Z"}, {"uuid": "3ac9397f-253d-4e1b-ac10-f4d6f747d5c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfltsksvms27", "content": "", "creation_timestamp": "2025-01-13T03:57:23.305596Z"}, {"uuid": "8416df51-599f-4bed-bd39-818fb8080861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8253", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-43044\u7684\u5229\u7528\u65b9\u5f0f\nURL\uff1ahttps://github.com/v9d0g/CVE-2024-43044-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-13T07:41:52.000000Z"}, {"uuid": "7f706b1f-3797-46ae-bf69-ca5688d0ee42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/purple_medved/285", "content": "CVE-2024-43044: From file read to RCE in Jenkins\n\n\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u044b \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0434\u0435\u0442\u0430\u043b\u0438 \u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-43044 (\u043e\u0446\u0435\u043d\u043a\u0430 \u043f\u043e CVSS=8.8) Path Traversal, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 Jenkins.\n\n\u0421\u0443\u0442\u044c \u0431\u0430\u0433\u0438 \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u0439 \u0430\u0433\u0435\u043d\u0442 \u043c\u043e\u0436\u0435\u0442 \u0447\u0438\u0442\u0430\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u0441 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u0430, \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e Path Traversal \u0432 ClassLoaderProxy#fetchJar \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Remoting/Hudson library, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0442\u0432\u0435\u0447\u0430\u0435\u0442 \u0437\u0430 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 jar \u0444\u0430\u0439\u043b\u043e\u0432 \u0441 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u0430 \u043d\u0430 \u0430\u0433\u0435\u043d\u0442\u044b.\n\n\u041f\u043e\u043b\u0443\u0447\u0438\u0432 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0447\u0442\u0435\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432, \u043c\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c CVE-2024-23897, \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u0432\u0430\u043b\u0438\u0434\u043d\u044b\u0435 \"Remember me\" cookie \u0434\u043b\u044f \u0430\u043a\u043a\u0430\u0443\u043d\u0442\u0430 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430, \u0447\u0442\u043e\u0431\u044b \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0447\u0435\u0440\u0435\u0437 \u043a\u043e\u043d\u0441\u043e\u043b\u044c Groovy (Jenkins Scripting Engine).\n\n\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0438\u043c\u0435\u0435\u0442 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0440\u0435\u0436\u0438\u043c\u043e\u0432 \u0440\u0430\u0431\u043e\u0442\u044b \u0434\u043b\u044f Inbound (JNLP) \u0438\u043b\u0438 SSH \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0430\u0433\u0435\u043d\u0442\u043e\u0432 \u043a \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u0443 \u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u044b\u0433\u0440\u0443\u0436\u0430\u0435\u0442 \u0445\u044d\u0448\u0438 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u0432\u0441\u0435\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 \u0444\u043e\u0440\u043c\u0430\u0442\u0435 John The Ripper\ud83d\ude0e\n\u0422\u0430\u043a\u0438\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c, \u043e\u0442\u043b\u043e\u043c\u0430\u0432 \u0442\u0430\u0447\u043a\u0443 \u0441 \u0430\u0433\u0435\u043d\u0442\u043e\u043c, \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u0442\u044c \u0430\u0442\u0430\u043a\u0443 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440 Jenkins \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u0435 \u0442\u0430\u0447\u043a\u0438 \u0441 \u0430\u0433\u0435\u043d\u0442\u0430\u043c\u0438.\n\n\u2699\ufe0f POC: https://github.com/convisolabs/CVE-2024-43044-jenkins\n\ud83e\udeb2 \u0423\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u041f\u041e: Jenkins \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 Jenkins 2.471 \u0438 LTS 2.452.4, LTS 2.462.1\n\u2705 \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438: \u041f\u0430\u0442\u0447 \u0443\u0436\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d, \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 32.471 \u0438 LTS 2.452.4, LTS 2.462.1", "creation_timestamp": "2024-09-02T07:27:44.000000Z"}, {"uuid": "bc3511d2-8640-45f9-a1bb-5c8b92295f0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "seen", "source": "https://t.me/cvedetector/2685", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43044 - Jenkins Remoting ClassLoaderProxy File Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43044 \nPublished : Aug. 7, 2024, 2:15 p.m. | 33\u00a0minutes ago \nDescription : Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T16:58:03.000000Z"}, {"uuid": "c2c55805-6f05-4d5e-b96c-eaccfaa8b114", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/237", "content": "CVE-2024-43044  Jenkins \n*\nWriteUP\n*\nPOC exploit\n\n#jenkins", "creation_timestamp": "2024-08-30T18:57:16.000000Z"}, {"uuid": "ac007f95-8678-4e8c-be3e-c4436fec9d46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/dc_main/6608", "content": "CVE-2024-43044 Arbitrary file read vulnerability through agent connections can lead to RCE\n\nThe exploit will use the vulnerability to read files to forge a remember-me cookie for an admin account and gain access to Jenkins scripting engine.\n\nBlog: https://blog.convisoappsec.com/en/analysis-of-cve-2024-43044/\n\nSearch Query:\nHUNTER:/product.name=\"Jenkins\"\nSHODAN: product:\"Jenkins\"\nFOFA: app=\"Jenkins\"\nZoomEye: app:\"Jenkins\"", "creation_timestamp": "2024-08-30T22:05:23.000000Z"}, {"uuid": "f58685d1-e4bd-4f09-b6c2-ff5c3a17f2bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3308", "content": "https://github.com/convisolabs/CVE-2024-43044-jenkins\n\nExploit for the vulnerability CVE-2024-43044 in Jenkins\n#github #exploit", "creation_timestamp": "2024-10-11T17:57:47.000000Z"}, {"uuid": "5a6dcb2f-621b-4331-9b92-03764364c25f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "seen", "source": "https://t.me/CNArsenal/3109", "content": "https://blog.convisoappsec.com/en/analysis-of-cve-2024-43044/\n\nAnalysis of CVE-2024-43044 \u2014 From file read to RCE in Jenkins through agents\n#\u5206\u6790", "creation_timestamp": "2024-09-03T18:35:59.000000Z"}, {"uuid": "b10660f1-d6ef-4059-9887-d6859af1f012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8407", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExploit for the vulnerability CVE-2024-43044 in Jenkins\nURL\uff1ahttps://github.com/convisolabs/CVE-2024-43044-jenkins\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-29T14:57:41.000000Z"}, {"uuid": "39f93569-c6d2-454a-9764-d05e3ba6dcd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "seen", "source": "https://t.me/GithubRedTeam/8408", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExploit for the vulnerability CVE-2024-43044 in Jenkins\nURL\uff1ahttps://github.com/identity-threat-labs/Article-RegreSSHion-CVE-2024-6387\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-29T15:19:28.000000Z"}, {"uuid": "875ab3de-3ee7-4940-991a-e9f1bb8ce811", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/2270", "content": "https://github.com/convisolabs/CVE-2024-43044-jenkins\n\nExploit for the vulnerability CVE-2024-43044 in Jenkins\n#github #exploit", "creation_timestamp": "2024-10-11T18:10:11.000000Z"}, {"uuid": "61cce7f1-dad8-4107-8148-05df6a80ca7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "Telegram/KbPnlrKlxSy1hwpSbv5unTg7jjETTWf7qelsyzy5hg3zUw", "content": "", "creation_timestamp": "2024-10-15T05:09:09.000000Z"}, {"uuid": "7fbb8da6-bd5a-40e1-9c54-437bcdfb2089", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2253", "content": "CVE-2024-43044  Jenkins \n*\nWriteUP\n*\nPOC exploit\n\n#jenkins", "creation_timestamp": "2024-08-30T12:03:40.000000Z"}, {"uuid": "31497d21-5522-4873-b440-227c77859157", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "published-proof-of-concept", "source": "https://t.me/zer0day1ab/227", "content": "CVE-2024-43044 Arbitrary file read vulnerability through agent connections can lead to RCE\n\nThe exploit will use the vulnerability to read files to forge a remember-me cookie for an admin account and gain access to Jenkins scripting engine.\n\nBlog: https://blog.convisoappsec.com/en/analysis-of-cve-2024-43044/\n\nSearch Query:\nHUNTER:/product.name=\"Jenkins\"\nSHODAN: product:\"Jenkins\"\nFOFA: app=\"Jenkins\"\nZoomEye: app:\"Jenkins\"", "creation_timestamp": "2024-08-30T21:07:09.000000Z"}, {"uuid": "e703a03a-a8ce-4fee-ac0d-09adb897f1ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43044", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11077", "content": "#exploit\n1. CVE-2024-43044:\nFrom file read to RCE in Jenkins through agents\nhttps://blog.convisoappsec.com/en/analysis-of-cve-2024-43044\n\n2. CVE-2024-42815:\nBuffer Overflow in TP-Link Routers\nhttps://securityonline.info/cve-2024-42815-cvss-9-8-buffer-overflow-flaw-in-tp-link-routers-opens-door-to-rce\n\n3. CVE-2024-37084:\nSpring Cloud RCE\nhttps://blog.securelayer7.net/spring-cloud-skipper-vulnerability", "creation_timestamp": "2024-09-04T04:21:25.000000Z"}]}