Description
Jenkins Git server Plugin 99.va_0826a_b_cdfa_d and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing attackers with Overall/Read permission to read content from arbitrary files on the Jenkins controller file system.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0438 | Arbitrary file read vulnerability in Git server Plugin can lead to RCE |
Github GHSA |
GHSA-vph5-2q33-7r9h | Arbitrary file read vulnerability in Git server Plugin can lead to RCE |
References
History
Wed, 04 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 |
Fri, 18 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-06-04T14:34:33.599Z
Reserved: 2024-01-23T12:46:51.264Z
Link: CVE-2024-23899
Updated: 2024-08-01T23:13:08.396Z
Status : Modified
Published: 2024-01-24T18:15:09.467
Modified: 2025-06-04T15:15:23.400
Link: CVE-2024-23899
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA