Arbitrary File Replacement in Jenkins Squash TM Publisher Plugin by CloudBees
CVE-2021-43578

8.1HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 November 2021

Summary

The Jenkins Squash TM Publisher Plugin prior to version 1.0.0 lacks input validation on messages sent from agents to the controller. This flaw allows attackers who can control agent processes to overwrite arbitrary files in the Jenkins controller's file system with their own malicious JSON strings, potentially leading to further exploitation of the Jenkins environment.

Affected Version(s)

Jenkins Squash TM Publisher (Squash4Jenkins) Plugin <= 1.0.0

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.