An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196 | Vendor Advisory |
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196 | Vendor Advisory |
Configurations
History
23 Jan 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196 - Vendor Advisory |
09 Jun 2023, 18:32
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
25 May 2023, 00:40
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196 - Vendor Advisory | |
CPE | cpe:2.3:a:jenkins:pipeline_utility_steps:*:*:*:*:*:jenkins:*:* | |
CWE | CWE-787 | |
First Time |
Jenkins pipeline Utility Steps
Jenkins |
16 May 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-16 16:15
Updated : 2025-01-23 21:15
NVD link : CVE-2023-32981
Mitre link : CVE-2023-32981
JSON object : View
Products Affected
jenkins
- pipeline_utility_steps
CWE
CWE-787
Out-of-bounds Write