Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system.
{
"severity": "HIGH",
"cwe_ids": [
"CWE-22"
],
"github_reviewed_at": "2024-01-24T21:51:30Z",
"github_reviewed": true,
"nvd_published_at": "2024-01-24T18:15:09Z"
}