File Permission Vulnerability in Jenkins by Jenkins
CVE-2023-43496

8.8HIGH

Key Information:

Vendor
Jenkins
Status
Vendor
CVE Published:
20 September 2023

Summary

A vulnerability exists in Jenkins, where a temporary file is created in the system's temporary directory with default permissions when installing a plugin from a URL. This flaw allows an attacker with access to the temporary directory to potentially manipulate the temporary file before Jenkins installs it, leading to the possibility of arbitrary code execution. This issue affects versions 2.423 and earlier, along with Jenkins LTS 2.414.1 and earlier, highlighting a critical gap in secure plugin management.

Affected Version(s)

Jenkins 2.424

Jenkins 2.424

Jenkins 2.414.2 < 2.414.*

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.