We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | jenkins |
Reserved | 2024-01-23 |
Published | 2024-01-24 |
Updated | 2024-10-18 |
Jenkins Git server Plugin 99.va_0826a_b_cdfa_d and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing attackers with Overall/Read permission to read content from arbitrary files on the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3319 (Jenkins Security Advisory 2024-01-24)
http://www.openwall.com/lists/oss-security/2024/01/24/6