CVE-2023-50764

Name
CVE-2023-50764
Description
Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing attackers with Scriptler/Configure permission to delete arbitrary files on the Jenkins controller file system.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
jenkinsci-cert@googlegroups.com http://www.openwall.com/lists/oss-security/2023/12/13/4
jenkinsci-cert@googlegroups.com https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3205

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:jenkins:scriptler:*:*:*:*:*:jenkins:*:* jenkins >= None <= 342.v6a_89fd40f466

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
jenkins 3.19-community 2.440.3-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins 3.20-community 2.440.2-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins edge-community 2.479.1-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable