Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-23904


Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system.


Published

2024-01-24T18:15:09.707

Last Modified

2025-06-20T20:15:32.097

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo
  • Type: Secondary
    CWE-22

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application jenkins log_command ≤ 1.0.2 Yes

References