Jenkins Semantic Versioning Plugin 1.14 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-02T10:56:04.044Z
Reserved: 2023-01-23T00:00:00
Link: CVE-2023-24429

No data.

Status : Modified
Published: 2023-01-26T21:18:17.110
Modified: 2024-11-21T07:47:51.007
Link: CVE-2023-24429

No data.