Description
Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2022/11/15/4
https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2842
Related Vulnerabilities
CVE-2020-7226 Vulnerability in maven package org.cryptacular:cryptacular
CVE-2019-10346 Vulnerability in maven package org.jenkins-ci.plugins:embeddable-build-status
CVE-2021-29480 Vulnerability in maven package io.ratpack:ratpack-session
CVE-2018-1999002 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2018-5158 Vulnerability in maven package org.webjars.bowergithub.mozilla:pdfjs-dist