Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-qjpf-2jhx-3758: Arbitrary file read vulnerability in Jenkins Log Command Plugin

Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an ‘@’ character followed by a file path in an argument with the file’s contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system.

ghsa
#vulnerability#git#auth

Arbitrary file read vulnerability in Jenkins Log Command Plugin

High severity GitHub Reviewed Published Jan 24, 2024 to the GitHub Advisory Database • Updated Jan 24, 2024

ghsa: Latest News

GHSA-mj5r-x73q-fjw6: SPEmailHandler-PHP has Potential Abuse for Sending Arbitrary Emails