Common vulnerabilities and Exposures (CVE)

Skip to main content

Required CVE Record Information

Description

Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system.

Product Status

Learn more

Versions 1 Total

Default Status: unknown

affected

Updated:

This container includes required additional information provided by the CVE Program for this vulnerability.