Description
Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing attackers with Scriptler/Configure permission to delete arbitrary files on the Jenkins controller file system.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xcrr-x93h-rv4v | Arbitrary file deletion vulnerability in Jenkins Scriptler Plugin |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-02-13T17:19:31.180Z
Reserved: 2023-12-13T13:06:36.476Z
Link: CVE-2023-50764
No data.
Status : Modified
Published: 2023-12-13T18:15:43.737
Modified: 2024-11-21T08:37:16.057
Link: CVE-2023-50764
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA