Arbitrary file read vulnerability in Jenkins Log Command Plugin
High severity
GitHub Reviewed
Published
Jan 24, 2024
to the GitHub Advisory Database
•
Updated Jun 20, 2025
Description
Published by the National Vulnerability Database
Jan 24, 2024
Published to the GitHub Advisory Database
Jan 24, 2024
Reviewed
Jan 24, 2024
Last updated
Jun 20, 2025
Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system.
References