In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using MultipartFormDataParser creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/09/20/5 | Mailing List Third Party Advisory |
https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
25 Sep 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-20 17:15
Updated : 2024-09-25 01:36
NVD link : CVE-2023-43498
Mitre link : CVE-2023-43498
CVE.ORG link : CVE-2023-43498
JSON object : View
Products Affected
jenkins
- jenkins
CWE