Path Traversal Vulnerability in Jenkins Support Core Plugin
CVE-2019-16540
6.5MEDIUM
Summary
A path traversal vulnerability in the Jenkins Support Core Plugin versions 2.63 and earlier allows authenticated attackers with Overall/Read permissions to exploit the flaw to delete arbitrary files on the Jenkins master server. This can lead to critical disruptions in operations and data integrity, emphasizing the need for timely updates and security measures.
Affected Version(s)
Jenkins Support Core Plugin 2.63 and earlier
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved