Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-02-13T17:39:59.979Z
Reserved: 2024-01-23T12:46:51.265Z
Link: CVE-2024-23904

No data.

Status : Modified
Published: 2024-01-24T18:15:09.707
Modified: 2024-11-21T08:58:40.703
Link: CVE-2024-23904

No data.