Jenkins Semantic Versioning Plugin 1.14 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
{ "nvd_published_at": "2023-01-26T21:18:00Z", "github_reviewed_at": "2023-01-27T01:00:32Z", "severity": "CRITICAL", "github_reviewed": true, "cwe_ids": [ "CWE-611" ] }