Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-43497

Опубликовано: 20 сент. 2023
Источник: debian
EPSS Низкий

Описание

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jenkinsremovedpackage

EPSS

Процентиль: 15%
0.0005
Низкий

Связанные уязвимости

CVSS3: 3.6
redhat
около 2 лет назад

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

CVSS3: 8.1
nvd
около 2 лет назад

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

CVSS3: 3.6
github
около 2 лет назад

Jenkins temporary uploaded file created with insecure permissions

CVSS3: 8.1
fstec
около 2 лет назад

Уязвимость сервера автоматизации Jenkins, связанная с неограниченной загрузкой файла опасного типа, позволяющая нарушителю получить доступ на чтение, изменение или удаление файлов

CVSS3: 8.8
redos
больше 1 года назад

Множественные уязвимости jenkins

EPSS

Процентиль: 15%
0.0005
Низкий