Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-0404 Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system.
Github GHSA Github GHSA GHSA-qjpf-2jhx-3758 Arbitrary file read vulnerability in Jenkins Log Command Plugin
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-06-20T19:30:22.525Z

Reserved: 2024-01-23T12:46:51.265Z

Link: CVE-2024-23904

cve-icon Vulnrichment

Updated: 2024-08-01T23:13:08.430Z

cve-icon NVD

Status : Modified

Published: 2024-01-24T18:15:09.707

Modified: 2025-06-20T20:15:32.097

Link: CVE-2024-23904

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.