Description
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Remediation
References
Related Vulnerabilities
MySQL CVE-2019-2631 Vulnerability (CVE-2019-2631)
MySQL CVE-2022-21290 Vulnerability (CVE-2022-21290)
WordPress Plugin The Official Facebook Chat Cross-Site Request Forgery (1.2)
WordPress Plugin ReviewX-Multi-criteria Rating & Reviews for WooCommerce SQL Injection (1.6.8)
Oracle Application Server CVE-2006-3707 Vulnerability (CVE-2006-3707)