Jenkins Git server Plugin 99.va_0826a_b_cdfa_d and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing attackers with Overall/Read permission to read content from arbitrary files on the Jenkins controller file system.
Metrics
Affected Vendors & Products
References
History
Fri, 18 Oct 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-02-13T17:39:57.007Z
Reserved: 2024-01-23T12:46:51.264Z
Link: CVE-2024-23899

Updated: 2024-08-01T23:13:08.396Z

Status : Modified
Published: 2024-01-24T18:15:09.467
Modified: 2024-11-21T08:58:40.040
Link: CVE-2024-23899
