File Permission Vulnerability in Jenkins by Jenkins
CVE-2023-43496
8.8HIGH
Summary
A vulnerability exists in Jenkins, where a temporary file is created in the system's temporary directory with default permissions when installing a plugin from a URL. This flaw allows an attacker with access to the temporary directory to potentially manipulate the temporary file before Jenkins installs it, leading to the possibility of arbitrary code execution. This issue affects versions 2.423 and earlier, along with Jenkins LTS 2.414.1 and earlier, highlighting a critical gap in secure plugin management.
Affected Version(s)
Jenkins 2.424
Jenkins 2.424
Jenkins 2.414.2 < 2.414.*
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved