Description
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the system temporary directory to replace the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.
Remediation
References
Related Vulnerabilities
WordPress Plugin Click to Call or Chat Buttons Cross-Site Scripting (1.4.0)
WordPress Plugin Your Text Manager Cross-Site Scripting (0.3.0)
WordPress Plugin Delete All Comments Easily Cross-Site Request Forgery (1.3)
WordPress Plugin Email Before Download SQL Injection (3.6)
WordPress Plugin SCORM Cloud For WordPress 'ajax.php' SQL Injection (1.0.6.6)