FortiDAST
FortiDAST performs automated black-box dynamic application security testing of web applications to identify vulnerabilities that bad actors may exploit.
rdiwakar
Staff
Staff
Article Id 356818
Description

This outbreak alert on Jenkins covers vulnerability that is CVE-2024-23897.

 

CVE-2024-23897 is a critical vulnerability in Jenkins 2.441 and earlier, LTS 2.426.2 and earlier, an open-source automation server, that allows attackers to read arbitrary files on the server. This vulnerability is due to improper input validation in the Jenkins server, which allows attackers to manipulate specific parameters and trick the server into accessing sensitive files.

 

This article describes the assessment of arbitrary file read and remote code execution vulnerability in Jenkins server.

Scope

FortiDAST Scripting Engine updated in version 24.3.a

Solution

Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).

 

This technology enables FortiDAST to assess remotely with a high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.

 

To configure the scan, it will be necessary to enable the FSE group signature 'Jenkins' which will select the underlying script as per the scan requirement: 'CVE-2024-23897 Jenkins RCE Vulnerability.'

 

For reference, a step-by-step guide on how to configure FortiDAST to trigger FSE can be found on Fortinet’s blog:

https://www.fortinet.com/blog/business-and-technology/fortipentest-exploit-engine-a-new-security-ars...

Contributors