CVE-2024-23899

Name
CVE-2024-23899
Description
Jenkins Git server Plugin 99.va_0826a_b_cdfa_d and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing attackers with Overall/Read permission to read content from arbitrary files on the Jenkins controller file system.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
jenkinsci-cert@googlegroups.com http://www.openwall.com/lists/oss-security/2024/01/24/6
jenkinsci-cert@googlegroups.com https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3319

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:jenkins:git_server:*:*:*:*:*:jenkins:*:* jenkins >= None <= 99.va_0826a_b_cdfa_d

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
jenkins 3.19-community 2.440.3-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins 3.20-community 2.440.2-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins edge-community 2.479.1-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable