File Replacement Vulnerability in Jenkins Storable Configs Plugin by CloudBees
CVE-2020-2278
6.5MEDIUM
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 16 September 2020
What is CVE-2020-2278?
The Storable Configs Plugin for Jenkins prior to version 1.0 permits inadequate restrictions on user-defined file names. An attacker with Job/Configure permissions could potentially exploit this flaw to overwrite any '.xml' file within the Jenkins controller. This vulnerability allows unauthorized configuration changes that could compromise the integrity and security of Jenkins jobs managed on the affected server.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Storable Configs Plugin <= 1.0
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved