First published: Wed Jan 24 2024(Updated: )
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com Matisse Beckandt
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins CI/CD | =2.442 | |
Jenkins CI/CD | =LTS 2.426.3 | |
redhat/Jenkins | <2.442 | 2.442 |
redhat/Jenkins LTS | <2.426.3 | 2.426.3 |
maven/org.jenkins-ci.main:jenkins-core | >=2.427<2.440.1 | 2.440.1 |
maven/org.jenkins-ci.main:jenkins-core | =2.441 | 2.442 |
maven/org.jenkins-ci.main:jenkins-core | >=1.606<=2.426.2 | 2.426.3 |
Jenkins Jenkins | <2.426.3 | |
Jenkins Jenkins | <2.442 | |
Jenkins Jenkins Command Line Interface (CLI) |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.