A critical vulnerability has been reported in Jenkins, a widely used tool for automating software development tasks, identified as CVE-2024-43044 with a CVSSv3 score of 8.8. This vulnerability allows Jenkins agents to read arbitrary files from the controller.
A Proof of Concept (PoC) for this vulnerability has been published. The availability of a PoC significantly increases the risk of attacks on your company, as it makes it easier for attackers to exploit the flaw. Immediate action is required to mitigate the vulnerability, such as applying patches and reviewing security policies.