Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0515 | Jenkins Semantic Versioning Plugin 1.14 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. |
Github GHSA |
GHSA-pcc2-w6m8-x5w4 | Agent-to-controller security bypass in Jenkins Semantic Versioning Plugin |
Wed, 02 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-04-02T14:22:13.481Z
Reserved: 2023-01-23T00:00:00.000Z
Link: CVE-2023-24429
Updated: 2024-08-02T10:56:04.044Z
Status : Modified
Published: 2023-01-26T21:18:17.110
Modified: 2025-04-02T15:15:55.370
Link: CVE-2023-24429
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA