Arbitrary file read vulnerability in Jenkins Continuous Integration with Toad Edge Plugin
Moderate severity
GitHub Reviewed
Published
Mar 30, 2022
to the GitHub Advisory Database
•
Updated Dec 6, 2023
Package
Affected versions
< 2.4
Patched versions
2.4
Description
Published by the National Vulnerability Database
Mar 29, 2022
Published to the GitHub Advisory Database
Mar 30, 2022
Reviewed
Nov 29, 2022
Last updated
Dec 6, 2023
Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Item/Configure permission to read arbitrary files on the Jenkins controller by specifying an input folder on the Jenkins controller as a parameter to its build steps.
References