Jenkins Git server Plugin 99.va_0826a_b_cdfa_d and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing attackers with Overall/Read permission to read content from arbitrary files on the Jenkins controller file system.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-0438 Arbitrary file read vulnerability in Git server Plugin can lead to RCE
Github GHSA Github GHSA GHSA-vph5-2q33-7r9h Arbitrary file read vulnerability in Git server Plugin can lead to RCE
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 04 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22

Fri, 18 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-06-04T14:34:33.599Z

Reserved: 2024-01-23T12:46:51.264Z

Link: CVE-2024-23899

cve-icon Vulnrichment

Updated: 2024-08-01T23:13:08.396Z

cve-icon NVD

Status : Modified

Published: 2024-01-24T18:15:09.467

Modified: 2025-06-04T15:15:23.400

Link: CVE-2024-23899

cve-icon Redhat

Severity : Important

Publid Date: 2024-01-09T00:00:00Z

Links: CVE-2024-23899 - Bugzilla

cve-icon OpenCVE Enrichment

No data.