Description
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type.
Remediation
References
Related Vulnerabilities
WordPress Plugin Recip.ly 'uploadImage.php' Arbitrary File Upload (1.1.7)
Oracle Database Server CVE-2010-0867 Vulnerability (CVE-2010-0867)
WordPress Plugin Age Verification 'redirect_to' Parameter URI Redirection (0.4)
PleskWin Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-4878)