Unauthorized File Read Vulnerability in Jenkins Git Server Plugin
CVE-2024-23899

6.5MEDIUM

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
24 January 2024

What is CVE-2024-23899?

The Jenkins Git Server Plugin is susceptible to a command parsing flaw that enables attackers with Overall/Read permissions to exploit a feature that improperly processes commands. Specifically, the vulnerability arises from the plugin's failure to restrict the '@' character, which—when followed by a file path—results in the inclusion of the file’s contents in user responses. As a consequence, an attacker can obtain unauthorized access to arbitrary files on the Jenkins controller's file system, potentially exposing sensitive information and undermining the integrity of the system.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Jenkins Git server Plugin 0 <= 99.va_0826a_b_cdfa_d

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.