File Permission Vulnerability in Jenkins by Jenkins
CVE-2023-43496

8.8HIGH

Key Information:

Vendor

Jenkins

Status
Vendor
CVE Published:
20 September 2023

What is CVE-2023-43496?

A vulnerability exists in Jenkins, where a temporary file is created in the system's temporary directory with default permissions when installing a plugin from a URL. This flaw allows an attacker with access to the temporary directory to potentially manipulate the temporary file before Jenkins installs it, leading to the possibility of arbitrary code execution. This issue affects versions 2.423 and earlier, along with Jenkins LTS 2.414.1 and earlier, highlighting a critical gap in secure plugin management.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Jenkins 2.424

Jenkins 2.424

Jenkins 2.414.2 < 2.414.*

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.