Arbitrary File Replacement in Jenkins Squash TM Publisher Plugin by CloudBees
CVE-2021-43578
8.1HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 12 November 2021
Summary
The Jenkins Squash TM Publisher Plugin prior to version 1.0.0 lacks input validation on messages sent from agents to the controller. This flaw allows attackers who can control agent processes to overwrite arbitrary files in the Jenkins controller's file system with their own malicious JSON strings, potentially leading to further exploitation of the Jenkins environment.
Affected Version(s)
Jenkins Squash TM Publisher (Squash4Jenkins) Plugin <= 1.0.0
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved