Description
Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system.
Remediation
References
https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2842
http://www.openwall.com/lists/oss-security/2022/11/15/4
Related Vulnerabilities
CVE-2018-1000150 Vulnerability in maven package org.jenkins-ci.plugins:reverse-proxy-auth-plugin
CVE-2022-37724 Vulnerability in maven package wonder.utilities:utilities
CVE-2022-23619 Vulnerability in maven package org.xwiki.platform:xwiki-platform-web
CVE-2023-41329 Vulnerability in maven package org.wiremock:wiremock-standalone