Lucene search

K
prionPRIOn knowledge basePRION:CVE-2024-23897
HistoryJan 24, 2024 - 6:15 p.m.

Design/Logic Flaw

2024-01-2418:15:00
PRIOn knowledge base
www.prio-n.com
11
jenkins
version
cli
command
parser
unauthenticated
file read
security flaw

7.5 High

AI Score

Confidence

High

0.96 High

EPSS

Percentile

99.5%

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an ‘@’ character followed by a file path in an argument with the file’s contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

CPENameOperatorVersion
jenkinslt2.426.3
jenkinslt2.442