Description
Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system.
Remediation
References
http://www.openwall.com/lists/oss-security/2022/11/15/4
https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2842
Related Vulnerabilities
CVE-2019-10759 Vulnerability in npm package safer-eval
CVE-2023-31103 Vulnerability in maven package org.apache.inlong:manager-pojo
CVE-2020-7773 Vulnerability in npm package markdown-it-highlightjs
CVE-2021-33420 Vulnerability in npm package replicator
CVE-2021-40110 Vulnerability in maven package org.apache.james:james-server