Jenkins Semantic Versioning Plugin 1.14 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
{
"nvd_published_at": "2023-01-26T21:18:00Z",
"github_reviewed_at": "2023-01-27T01:00:32Z",
"severity": "CRITICAL",
"cwe_ids": [
"CWE-611"
],
"github_reviewed": true
}