In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using MultipartFormDataParser creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2023/09/20/5 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
25 Sep 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-20 17:15
Updated : 2024-09-25 01:36
NVD link : CVE-2023-43498
Mitre link : CVE-2023-43498
JSON object : View
Products Affected
jenkins
- jenkins
CWE