Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Metrics
Affected Vendors & Products
References
History
Tue, 20 Aug 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 20 Aug 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | CWE-22 |
Mon, 19 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-27 |
Mon, 19 Aug 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-19T16:20:22.425Z
Reserved: 2024-01-23T12:46:51.263Z
Link: CVE-2024-23897

Updated: 2024-08-19T07:48:11.721Z

Status : Analyzed
Published: 2024-01-24T18:15:09.370
Modified: 2024-12-20T17:30:33.613
Link: CVE-2024-23897
