SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Jenkins CLI Arbitrary File Read

Category: WEB-ATTACKS      

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2119


Relevant Information