Description
Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing attackers with Scriptler/Configure permission to delete arbitrary files on the Jenkins controller file system.
Published: 2023-12-13
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xcrr-x93h-rv4v Arbitrary file deletion vulnerability in Jenkins Scriptler Plugin
History

No history.

Subscriptions

Jenkins Scriptler
cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-02-13T17:19:31.180Z

Reserved: 2023-12-13T13:06:36.476Z

Link: CVE-2023-50764

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-13T18:15:43.737

Modified: 2024-11-21T08:37:16.057

Link: CVE-2023-50764

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses