CVE-2023-50764

5 documents5 sources
Severity
8.1HIGH
EPSS
0.1%
top 80.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 13

Description

Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing attackers with Scriptler/Configure permission to delete arbitrary files on the Jenkins controller file system.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:HExploitability: 2.8 | Impact: 5.2

Affected Packages3 packages

CVEListV5jenkins_project/jenkins_scriptler_plugin342.v6a_89fd40f466
NVDjenkins/scriptler342.v6a_89fd40f466

🔴Vulnerability Details

3
OSV
Arbitrary file deletion vulnerability in Jenkins Scriptler Plugin2023-12-13
CVEList
CVE-2023-50764: Jenkins Scriptler Plugin 3422023-12-13
GHSA
Arbitrary file deletion vulnerability in Jenkins Scriptler Plugin2023-12-13

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2023-12-132023-12-13
CVE-2023-50764 (HIGH CVSS 8.1) | Jenkins Scriptler Plugin 342.v6a_89 | cvebase.io