Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hwmex0/cve-2024-43044
The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.
https://github.com/hwmex0/cve-2024-43044
cve-2024-43044 detection jenkins
Last synced: 4 months ago
JSON representation
The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.
- Host: GitHub
- URL: https://github.com/hwmex0/cve-2024-43044
- Owner: HwMex0
- Created: 2024-08-08T08:28:26.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-08-08T09:32:00.000Z (6 months ago)
- Last Synced: 2024-09-30T17:42:56.851Z (4 months ago)
- Topics: cve-2024-43044, detection, jenkins
- Language: Python
- Homepage:
- Size: 5.86 KB
- Stars: 10
- Watchers: 1
- Forks: 5
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2024-43044
## Description
This script checks Jenkins instances for CVE-2024-43044 by retrieving the Jenkins version from the instance and comparing it against known vulnerable version ranges.- **CVE-2024-43044**: This vulnerability affects Jenkins core and remoting versions, allowing attackers to exploit certain versions of Jenkins. Details about this CVE can be found [here](https://feedly.com/cve/CVE-2024-43044).
- **GHSA-h856-ffvv-xvr4**: This advisory covers another set of vulnerabilities in Jenkins versions, providing specific version ranges that are susceptible to attacks. More information is available on the [GitHub advisory page](https://github.com/advisories/GHSA-h856-ffvv-xvr4).## Script Functionality
The script performs the following steps:
1. **Retrieve Jenkins Version**: It sends a request to the Jenkins URL and retrieves the Jenkins version from the response headers.
2. **Check Version Ranges**: It compares the retrieved version against predefined vulnerable version ranges.
3. **Output Results**: It prints whether the Jenkins instance is potentially vulnerable based on the version check.## Usage
### Command Line
To check a list of Jenkins instance URLs provided as command-line arguments:
```sh
python CVE-2024-43044.py ...
```To check Jenkins instance URLs from a file:
```sh
python CVE-2024-43044.py -f
```## References
- [CVE-2024-43044](https://feedly.com/cve/CVE-2024-43044)
- [GitHub Security Advisory GHSA-h856-ffvv-xvr4](https://github.com/advisories/GHSA-h856-ffvv-xvr4)Use this script to ensure your Jenkins instances are secure and up-to-date by regularly checking for vulnerabilities.