CVE-2023-32981

An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:pipeline_utility_steps:*:*:*:*:*:jenkins:*:*

History

23 Jan 2025, 21:15

Type Values Removed Values Added
References (MISC) https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196 - Vendor Advisory () https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196 - Vendor Advisory

09 Jun 2023, 18:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.8

25 May 2023, 00:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References (MISC) https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196 - (MISC) https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196 - Vendor Advisory
CPE cpe:2.3:a:jenkins:pipeline_utility_steps:*:*:*:*:*:jenkins:*:*
CWE CWE-787
First Time Jenkins pipeline Utility Steps
Jenkins

16 May 2023, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-16 16:15

Updated : 2025-01-23 21:15


NVD link : CVE-2023-32981

Mitre link : CVE-2023-32981


JSON object : View

Products Affected

jenkins

  • pipeline_utility_steps
CWE
CWE-787

Out-of-bounds Write