Jenkins Semantic Versioning Plugin 1.14 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-04-02T14:22:13.481Z
Reserved: 2023-01-23T00:00:00.000Z
Link: CVE-2023-24429

Updated: 2024-08-02T10:56:04.044Z

Status : Modified
Published: 2023-01-26T21:18:17.110
Modified: 2025-04-02T15:15:55.370
Link: CVE-2023-24429

No data.