TCP: Jenkins Remoting fetchJar Arbitrary File Read

This signature detects attempts to exploit a known vulnerability against Jenkins. A successful attack can lead to arbitrary code execution.

Extended Description

Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.

Affected Products

Jenkins jenkins

Short Name
TCP:C2S:JENKINS-FTCH-JAR-FLE-RD
Severity
Major
Recommended
False
Recommended Action
Drop
Category
TCP
Keywords
Arbitrary CVE-2024-43044 File Jenkins Read Remoting fetchJar
Release Date
11/13/2024
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3758
Port
TCP/50000,8080
False Positive
Unknown
Vendors

Jenkins

Found a potential security threat?