Description
Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system.
Remediation
References
https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2842
http://www.openwall.com/lists/oss-security/2022/11/15/4
Related Vulnerabilities
CVE-2023-28155 Vulnerability in npm package request
CVE-2023-30541 Vulnerability in npm package @openzeppelin/contracts
CVE-2019-1003072 Vulnerability in maven package org.jenkins-ci.plugins:wildfly-deployer
CVE-2022-45935 Vulnerability in maven package org.apache.james:james-server-core
CVE-2019-10419 Vulnerability in maven package org.jenkins-ci.plugins:application-director-plugin