Analytics Story: Jenkins Server Vulnerabilities
Description
This analytic story provides a comprehensive view of Jenkins server vulnerabilities and associated detection analytics.
Why it matters
The following analytic story provides a comprehensive view of Jenkins server vulnerabilities and associated detection analytics. Jenkins is a popular open-source automation server that is used to automate tasks associated with building, testing, and deploying software. Jenkins is often used in DevOps environments and is a critical component of the software development lifecycle. As a result, Jenkins servers are often targeted by adversaries to gain access to sensitive information, credentials, and other critical assets. This analytic story provides a comprehensive view of Jenkins server vulnerabilities and associated detection analytics.
Detections
Name | Technique | Type |
---|---|---|
Jenkins Arbitrary File Read CVE-2024-23897 | Exploit Public-Facing Application | TTP |
Data Sources
Name | Platform | Sourcetype | Source |
---|---|---|---|
Nginx Access | N/A | nginx:plus:kv |
/var/log/nginx/access.log |
References
Source: GitHub | Version: 1