SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Jenkins CLI Arbitrary File Read 2

Category: WEB-ATTACKS      

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

References
http://en.wikipedia.org/wiki/Arbitrary_code_execution


Relevant Information