CVE-2023-50764

high

Description

Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing attackers with Scriptler/Configure permission to delete arbitrary files on the Jenkins controller file system.

References

https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3205

http://www.openwall.com/lists/oss-security/2023/12/13/4

Details

Source: Mitre, NVD

Published: 2023-12-13

Updated: 2023-12-18

Risk Information

CVSS v2

Base Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Severity: High